CYINS

CYINS

University

11 Qs

quiz-placeholder

Similar activities

G Suite

G Suite

4th Grade - Professional Development

13 Qs

EC8393_FDS_MODEL EXAM_3_PART B

EC8393_FDS_MODEL EXAM_3_PART B

University

15 Qs

Module 2 Lesson 2 Part 2 Assessment

Module 2 Lesson 2 Part 2 Assessment

University

10 Qs

MCQ 1

MCQ 1

University

10 Qs

Understanding Email, Contacts and Calendaring

Understanding Email, Contacts and Calendaring

University

10 Qs

BB

BB

University

10 Qs

Review Ciclo 1

Review Ciclo 1

University

11 Qs

Dr. S. Uma's Object Oriented Programming Quiz Event 1

Dr. S. Uma's Object Oriented Programming Quiz Event 1

University

10 Qs

CYINS

CYINS

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Ms. R

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, the order of the letters in a message is rearranged by __________

transpositional ciphers

substitution ciphers

both transpositional ciphers and substitution ciphers

quadratic ciphers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

............ is the science and art of transforming message s to make them secure and immune to attacks.

Cryptography

Cryptoanalysis

Either(a)or(b)

neither(a)or(b)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ............ is the original message before transformation.

Ciphertext

Plaintext

Secret-text

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ............ is the message after transformation

Ciphertext

Plaintext

Secret-text

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The shift cipher sometimes referred to as the.

Shift modulus

cipher modulus

caeser cipher

None of these

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of encryption uses the same key for both encryption and decryption?

Asymmetric encryption

Hashing

Symmetric encryption

None of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The plaintext encrypts to different cipher text with different keys

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers