Exam 1: Security Measures and Encryption Techniques for Information Protection
Exam 1: Security Measures and Encryption Techniques for Information Protection25 Questions
Exam 2: Cryptography and Security: Part A24 Questions
Exam 3: Cryptography and Security: Part B7 Questions
Exam 4: Information Security and Encryption24 Questions
Exam 5: Network Security and Cryptographic Protocols24 Questions
Select questions type
Prevention of the unauthorised used of Resources refers too?
Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
C
Conversion of plain text into Cipher text is called as .
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
A
An act of protecting information from unauthorised disclouser to an entity.-
Free
(Multiple Choice)
4.9/5
(48)
Correct Answer:
C
______________means knowledge obtained from investigation, study , intelligence new ,facts .
(Multiple Choice)
4.9/5
(30)
______________is used to create the organisation's overall security program.
(Multiple Choice)
4.9/5
(32)
Security Measures Needed to protect during their transmission
(Multiple Choice)
4.9/5
(36)
In Symmetric schemes requires both parties to share how many secret key?
(Multiple Choice)
4.8/5
(31)
A way to ensure that the entity is indeed what it claims to be.-
(Multiple Choice)
4.9/5
(31)
Protection against Denial by one of these parties in a communication refers to?
(Multiple Choice)
4.9/5
(30)
A hacker guessing suggested password to a program is call as?
(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)