Appendix: Multiple Choice Questions and Answers
A.1 Questions
A.1.1 Basic Definitions of Security and Cryptography
1. Any item of value in information security is known as
|
2. Which of the following best describes cryptography?
|
3. Verifying that data received was sent by the specified sender is a test of
|
4. Which of the following is the best source to pick a random text?
|
5. The weakness in a risk mitigating action is referred to as: |
a) Exposure b) Vulnerability c) Attack d) Risk |
6. Sending unsolicited contents is an act of
|
7. Which of the following is the property of information being disclosed only to authorized people?
|
8. What term is used in security to refer to potential danger regarding a system if an adversary exploits a vulnerability of the system?
|
9. In the internet, the main security issue is
|
Get Cryptography now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.