Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

University

6 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

TAC3121-Quiz 4

TAC3121-Quiz 4

University

10 Qs

How does the Internet work?

How does the Internet work?

KG - Professional Development

10 Qs

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

11th Grade - University

9 Qs

Data Communication

Data Communication

University

8 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

CB3491 CRYPTOGRAPHY AND CYBER SECURITY

University

10 Qs

Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

Assessment

Quiz

Computers

University

Hard

Created by

Brien Croteau

Used 3+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What word is used to define a method to transform a message to conceal its meaning?

cipher

plaintext

ciphertext

key

2.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the biggest challenge when deploying symmetric encryption?

length of ciphertext

key distribution

encryption algorithm

decryption speed

3.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

Which of the following is NOT a Cryptanalysis technique

Frequency Analysis

Known Plaintext Attack

Electronic Key Management

Brute Force Attack

4.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

If you just want to preserve Confidentiality using Asymmetric Encryption which key should you use to encrypt a message?

Sender's Private Key

Sender's Public Key

Receiver's Private Key

Receiver's Public Key

5.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

If you just want to Authenticate the sender when using Asymmetric Encryption which key should you use to encrypt a message?

Sender's Private Key

Sender's Public Key

Receiver's Private Key

Receiver's Public Key

6.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the name of the attack if an adversary replaces the public key of your intended recipient with a new one they created?

Brute Force Attack

Man-in-the-Middle Attack

Known Plaintext Attack

Denial of Service Attack