Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

University

6 Qs

quiz-placeholder

Similar activities

WJEC ICT  - Chapter 2 - The Internet: Packets & Routing

WJEC ICT - Chapter 2 - The Internet: Packets & Routing

10th Grade - University

8 Qs

Cryptography 1

Cryptography 1

University

10 Qs

Cybersecurity attacks

Cybersecurity attacks

University

10 Qs

SIM - Securing Information System

SIM - Securing Information System

University

10 Qs

Cross-Site Scripting

Cross-Site Scripting

University

10 Qs

Cross Site Scripting

Cross Site Scripting

University

10 Qs

Basic Cyber Awareness Test

Basic Cyber Awareness Test

University

10 Qs

Chapter 6 (Fundamentals of Cybersecurity

Chapter 6 (Fundamentals of Cybersecurity

University

10 Qs

Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

Assessment

Quiz

Computers

University

Hard

Created by

Brien Croteau

Used 3+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What word is used to define a method to transform a message to conceal its meaning?

cipher

plaintext

ciphertext

key

2.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the biggest challenge when deploying symmetric encryption?

length of ciphertext

key distribution

encryption algorithm

decryption speed

3.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

Which of the following is NOT a Cryptanalysis technique

Frequency Analysis

Known Plaintext Attack

Electronic Key Management

Brute Force Attack

4.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

If you just want to preserve Confidentiality using Asymmetric Encryption which key should you use to encrypt a message?

Sender's Private Key

Sender's Public Key

Receiver's Private Key

Receiver's Public Key

5.

MULTIPLE CHOICE QUESTION

20 sec • 3 pts

If you just want to Authenticate the sender when using Asymmetric Encryption which key should you use to encrypt a message?

Sender's Private Key

Sender's Public Key

Receiver's Private Key

Receiver's Public Key

6.

MULTIPLE CHOICE QUESTION

10 sec • 3 pts

What is the name of the attack if an adversary replaces the public key of your intended recipient with a new one they created?

Brute Force Attack

Man-in-the-Middle Attack

Known Plaintext Attack

Denial of Service Attack