quiz1
quiz1
Quiz Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- Choose the best answer 0%
- Fill in the blanks 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
-
- The congruence f(x) of degree n has ________ solutions
d)
CorrectIncorrect -
-
Question 2 of 10
2. Question
Conventional Encryption is also referred as _________ encryption
CorrectIncorrect -
Question 3 of 10
3. Question
- Name one objective of Cryptography.
CorrectIncorrect -
Question 4 of 10
4. Question
Write any general category of attack
CorrectIncorrect -
Question 5 of 10
5. Question
- The origin of cryptography is _________.
CorrectIncorrect -
Question 6 of 10
6. Question
Cryptography is the study of _______technique.
CorrectIncorrect -
Question 7 of 10
7. Question
7._____________ is an attack on integrity
CorrectIncorrect -
Question 8 of 10
8. Question
8.________ is an attack on confidentiality.
CorrectIncorrect -
Question 9 of 10
9. Question
9.The security of conventional encryption depends on the secrecy of the _____.
CorrectIncorrect -
Question 10 of 10
10. Question
10.The earliest known use of a substitution cipher was developed by_____.
CorrectIncorrect