You are on page 1of 5

Quiz 1- Requires Respondus LockDown Browser

Results for Michael Metry


Score for this attempt: 8 out of 10
Submitted Jan 20 at 12:20p.m.
This attempt took 6 minutes.

1 / 1 pts
Question 1

The main types of operations in cryptography are: substitution and


__________________.

Correct! Transposition

Encryption

Transportaion

Decryption

1 / 1 pts
Question 2

Security attacks are classified as either passive or ________________.

Man-in-the-middle

Aggressive

Massive

Correct! Active
1 / 1 pts
Question 3

A common technique for masking contents of messages or other


information traffic so that opponents can not extract the information from
the message is __________ .

Correct! Encryption

Integrity

Analysis

Masquerade

0 / 1 pts
Question 4

An active attack can be in the form of ____________.

ou Answered All of the other options

Inference attack

Traffic analysis

orrect Answer Reply attack

1 / 1 pts
Question 5

The availability of the system means that ___________.


The system is available to white hat hackers.

The system is available to illegitimate users.

The system is available in the market.

Correct!
The system is working promptly and the service is not denied to authorized
users.

1 / 1 pts
Question 6

An example of computer assets that have to be secured


is_____________.

Hardwar and software

Communication facilities and networks.

Correct! All of the other options

Data

1 / 1 pts
Question 7

The confidentiality of the asset involves ____________.

Correct! Only the privacy of the legitimate users.

Only the encryption of the data.

Correct! Data confidentiality and Privacy


The correct working of the system.

1 / 1 pts
Question 8

What will be the cipher of the text (computer Security) using Caesar
Cipher Algorithm with key =4?

Hint:

abc de f ghi j k l m n o p q r s t u v w x y
z

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Correct! GSQTYXIVWIGYVMXC

WIGYVMXCGSQTYXIV

GSQTYXIVWIGYVMXZ

WIGYVMXC GSQTYXIV

1 / 1 pts
Question 9

What will be the cipher of the text (computer Security) using Caesar
Cipher Algorithm with key =4?

Hint:

abc de f ghi j k l m n o p q r s t u v w x y
z

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Correct! GSQTYXIVWIGYVMXC

GSQTYXIVWIGYVMXZ

WIGYVMXCGSQTYXIV

WIGYVMXC GSQTYXIV

0 / 1 pts
Question 10

What will be the cipher of the text (computer Security) using Caesar
Cipher Algorithm with key =4?

Hint:

abc de f ghi j k l m n o p q r s t u v w x y
z

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

orrect Answer GSQTYXIVWIGYVMXC

ou Answered GSQTYXIVWIGYVMXZ

WIGYVMXCGSQTYXIV

WIGYVMXC GSQTYXIV

Quiz Score: 8 out of 10

You might also like