Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Computer
Netw4009 Lecture 7 Exam
8 Questions
|
By Gdeisat1 | Updated: Mar 22, 2022
| Attempts: 36
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 8
0 %
0/100
Score
0/100
1.
Non-repudiation refers to ______________
Detect modified messages
Sender cannot later falsely deny sending a message. Receiver cannot falsely deny receiving it.
Keep information secret.
Receiver can verify who sender was.
Submit
Start Quiz
About This Quiz
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
Making sure that the data has not been changed unintentionally, due to an accident or malice, is:
Integrity
Confidentiality
Availability
Auditability
Submit
3.
Network security aims to provide several key services, which are?
Data integrity, data strategy, data mining
Data and system availability, data storage, data confidentiality
Data integrity, data and system availability, data confidentiality
Data strategy, data integrity, data center.
Submit
4.
When an email user accesses his account, he fills the password field. This is required for
Identification
Authentication
Hashing
None of the above
Submit
5.
MD5 is _______ algorithm
An encryption
A decryption
A hash
A public key
Submit
6.
Which of the following is responsible for MOST of the security incidents?
Equipment failure
Software failure
Personnel
Hackers
Submit
7.
Which option is a desirable feature of using symmetric encryption algorithms?
They are often used for wire-speed encryption in data networks
They are based on complex mathematical operations and can easily be accelerated by ...
They are based on complex mathematical operations and can easily be accelerated by hardware
They offer simple key management properties
They are best used for one-time encryption needs.
Submit
8.
RSA encryption is _____________ ; whereas RSA decryption is ______________
Slow, fast
Slow, slow
Fast, fast
Fast, slow
Submit
View My Results
Related Quizzes
Tablet Quiz: What Tablet Should I Buy Quiz
Tablet Quiz: What Tablet Should I Buy Quiz
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (8)
Unanswered (
)
Answered (
)
Non-repudiation refers to ______________
Making sure that the data has not been changed unintentionally, due to...
Network security aims to provide several key services, which are?
When an email user accesses his account, he fills the password field....
MD5 is _______ algorithm
Which of the following is responsible for MOST of the security...
Which option is a desirable feature of using symmetric encryption...
RSA encryption is _____________ ; whereas RSA decryption is...
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement