100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

NETSEC 3- Test Questions and Answers| Latest Update

Rating
-
Sold
-
Pages
29
Grade
A+
Uploaded on
11-02-2025
Written in
2024/2025

NETSEC 3- Test Questions and Answers| Latest Update

Institution
NETSEC
Module
NETSEC










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
NETSEC
Module
NETSEC

Document information

Uploaded on
February 11, 2025
Number of pages
29
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

NETSEC 3- Test Questions and Answers|
Latest Update
1) ________ is the use of mathematical operations to protect messages travelling between parties
or stored on a computer.

A) Cryptography

B) Encryption

C) Authentication

D) Confidentiality A



2) ________ is the security guarantee that people who intercept messages cannot read them.

A) Integrity

B) Availability

C) Confidentiality

D) Encryption C



3) Which of the following is transmitted across a network?

A) The plaintext

B) The ciphertext

C) Both A and B

D) Neither A nor B B



4) A ________ is a mathematical process used in encryption and decryption.

,A) key

B) cipher

C) plaintext

D) coding method B



5) A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt messages.

A) key

B) cipher

C) plaintext

D) code A



6) Someone who breaks encryption is called a ________.

A) cracker

B) coder

C) hacker

D) cryptanalyst D



7) ________ ciphers move letters around within a message but characters are not substituted.

A) Transposition

B) Substitution

C) Both A and B

D) Neither A nor B A

, 8) ________ ciphers leave letters in their original positions.

A) Transposition

B) Substitution

C) Both A and B

D) Neither A nor B B



9) In codes, code symbols may represent ________.

A) complete words

B) complete phrases

C) individual letters

D) All of the above D



10) When two parties communicate with each other using symmetric key encryption, how many
keys are used in total to encrypt and decrypt?

A) 1

B) 2

C) 4

D) 8 A



11) Nearly all encryption for confidentiality uses ________ encryption ciphers.

A) public key

B) symmetric key

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StudyLoom01 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
118
Member since
2 year
Number of followers
35
Documents
6930
Last sold
1 week ago
MINDSPIRE

FIND ALL EXAMS,STUDY GUIDES AND TEST BANKS, REVISION MATERIALS TO BOOST YOUR CAREER!! WELCOME (STUVIA 2025) Leave A review Once Purchased Documents has helped you So that other customers May be Satisfied. Also, Refer 2 colleagues and get One document Free. All the best in your Career. GOODLUCK!!! Thank you!

4.1

30 reviews

5
19
4
1
3
6
2
1
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions