101 Lecture 5

101 Lecture 5

University

6 Qs

quiz-placeholder

Similar activities

English Computer

English Computer

University

11 Qs

Quantum CT-3 Quiz

Quantum CT-3 Quiz

University

10 Qs

Chapter 5 Quiz

Chapter 5 Quiz

University

10 Qs

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

11th Grade - University

9 Qs

Access Control Matrix and ACL

Access Control Matrix and ACL

University

6 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

Cyber IT Act: Online Fraud Prevention

Cyber IT Act: Online Fraud Prevention

University

10 Qs

How does the Internet work?

How does the Internet work?

KG - Professional Development

10 Qs

101 Lecture 5

101 Lecture 5

Assessment

Quiz

Computers

University

Medium

Created by

Vasaka Visoottiviseth

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which concept is not included in CIA principles?h 

Accuracy

Integrity

Availability

Confidentiality

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q.2: Using an ATM card to login to withdraw money from a machine is categorized as which authentication method?

What You Know

What You Have

What You Are

What You Own

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q3: Which concept involves keeping track of user actions?

Authentication

Accounting

Auditing

Access Control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q4: Which type of Encryption that requires both the public key and the private key?

Symmetric Encryption

Asymmetric Encrytion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q5: In the Asymmetric Encryption, when Alice sends a secret message to Bob, Alice has to use which key to encrypt?

Bob's Public Key

Bob's Private Key

Alice's Public Key

Alice's Private Key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Q6: In the Asymmetric Encryption, when Bob receives a secret message from Alice, he has to use which key to decrypt?

Bob's Public Key

Bob's Private Key

Alice's Public Key

Alice's Private Key