You are on page 1of 2

Republic of the Philippines

Commission on Higher Education


SISTECH COLLEGE OF SANTIAGO CITY, INC.
Villasis, Santiago City, Isabela, 3311 Philippines

IT18 INFORMATION ASSURANCE AND SECURITY 2


Preliminary Examination

Name: ________________________________ Year Level: _____________________


Course: _______________________________ Score : _____________________

Fill in the blank. Fill the missing word or fill what is being describe.(2 pts each)
1. The collection of tools designed to protect data and to thwart hackers is called
______________
2. ______________ measures to protect data during their transmission
3. ______________ measures to protect data during their transmission over a
collection of interconnected networks
4. Any action that compromises the security of information owned by an organization
called ______________
5. ______________ is the art or science encompassing the principles and methods of
transforming an intelligible message into one that is unintelligible, and then retransforming
that message back to its original form
6. ______________ An algorithm for transforming an intelligible message into one
that is unintelligible by transposition and/or substitution methods
7. The process of converting plaintext to cipher text using a cipher and a key is called
______________ is the he original intelligible message
8. The process of converting cipher text back into plaintext using a cipher and a key is called
______________ .
9. ______________ is an algorithm for transforming an intelligible message into an
unintelligible one using a code-book

II. Multiple Choice. Select the correct answer. Write the letter only.

1. Any action that compromises the security of information owned by an organization.


a. Security attack b. Interruption c. Modification d. Fabrication

2. The study of principles and methods of transforming an unintelligible message back


into an intelligible message without knowledge of the key
a. Decipher b. Cipher c. Cryptanalysis d. Cryptography

3. The art or science encompassing the principles and methods of transforming an


intelligible message into one that is unintelligible, and then retransforming that
message back to its original form
a. Decipher b. Cipher c. Cryptanalysis d. Cryptography

4. The process of converting cipher text back into plaintext using a cipher and a key
a. Decipher b. Cipher c. Cryptanalysis d. Cryptography

5. The algorithm for transforming an intelligible message into one that is unintelligible
by transposition and/or substitution methods
a. Decipher b. Cipher c. Cryptanalysis d. Cryptography
III. INTERPRETATION. Explain the flow of information and how hackers attacks from
sender to the reciever by using the following method. (5pts each)

II. Interruption

III. Modification

IV. Fabrication

Prepared by: Checked by:

NELSON D. COSTALES AMELIA J. BANIQUED, MSIT


Instructor College Dean

You might also like