0% found this document useful (0 votes)
168 views5 pages

Dashboard My Courses 11S3105 KRIPTO 2021/2022 Week 01 Post Test Week 1

The document summarizes a student's attempt at a post-test for a cryptography course. The student answered 6 out of 10 questions incorrectly and received a grade of 40% on the test. It provides details of each question, the student's answer, and whether it was correct or incorrect.

Uploaded by

satu dua
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
168 views5 pages

Dashboard My Courses 11S3105 KRIPTO 2021/2022 Week 01 Post Test Week 1

The document summarizes a student's attempt at a post-test for a cryptography course. The student answered 6 out of 10 questions incorrectly and received a grade of 40% on the test. It provides details of each question, the student's answer, and whether it was correct or incorrect.

Uploaded by

satu dua
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

8/27/2021 Post Test Week 1: Attempt review

Dashboard My courses 11S3105 KRIPTO 2021/2022 Week 01 Post Test Week 1

Started on Friday, 27 August 2021, 9:51 AM


State Finished
Completed on Friday, 27 August 2021, 9:57 AM
Time taken 5 mins 21 secs
Grade 40.00 out of 100.00

Question 1
Incorrect

Mark 0.00 out of 10.00

Passive attacks involve some modification of the data stream or the creation of a false stream.

Select one:
True 

False

The correct answer is 'False'.

Question 2
Correct

Mark 10.00 out of 10.00

In a(n)... cipher, the same key is used by both the sender and receiver.

a. symmetric-key

b. asymmetric-key

c. either (a) or (b)

d. neither (a) nor (b)

Your answer is correct.


The correct answer is:
symmetric-key

https://ecourse.del.ac.id/mod/quiz/review.php?attempt=153539&cmid=26346 1/5
8/27/2021 Post Test Week 1: Attempt review

Question 3
Incorrect
Mark 0.00 out of 10.00

... , this is an attack on availability.

a. Fabrication

b. Interception

c. Modification

d. Interruption

Your answer is incorrect.

The correct answer is:


Interruption

Question 4
Incorrect

Mark 0.00 out of 10.00

Type of passive attacks.

a. Replay 

b. Release of message contents

c. Masquerade

d. Denial of service

Your answer is incorrect.


The correct answer is:
Release of message contents

https://ecourse.del.ac.id/mod/quiz/review.php?attempt=153539&cmid=26346 2/5
8/27/2021 Post Test Week 1: Attempt review

Question 5
Incorrect
Mark 0.00 out of 10.00

The basic components of information security.

a. Confidentiality

b. Integrity

c. Availability

d. all of the above

Your answer is incorrect.

The correct answer is:


all of the above

Question 6
Incorrect

Mark 0.00 out of 10.00

In an asymmetric-key key cipher, the sender uses the ... key.

a. private

b. public

c. either (a) or (b)


d. neither (a) nor (b)

Your answer is incorrect.


The correct answer is:
public

https://ecourse.del.ac.id/mod/quiz/review.php?attempt=153539&cmid=26346 3/5
8/27/2021 Post Test Week 1: Attempt review

Question 7
Correct
Mark 10.00 out of 10.00

The ... is the original message before transformation.

a. Chipertext

b. Plaintext

c. None of the above

d. Secret-text

Your answer is correct.

The correct answer is:


Plaintext

Question 8
Incorrect

Mark 0.00 out of 10.00

.... is the science and art of transforming messages to make them secure and immune to attacks.

a. Cryptography

b. Cryptoanalysis

c. Either (a) or (b)


d. Neither (a) nor (b)

Your answer is incorrect.


The correct answer is:
Cryptography

https://ecourse.del.ac.id/mod/quiz/review.php?attempt=153539&cmid=26346 4/5
8/27/2021 Post Test Week 1: Attempt review

Question 9
Correct
Mark 10.00 out of 10.00

A(n) ... algorithm transforms plaintext to chipertext.

a. Encryption

b. Decryption

c. Either (a) or (b)

d. Neither (a) or (b)

Your answer is correct.

The correct answer is:


Encryption

Question 10
Correct

Mark 10.00 out of 10.00

A combination of an encryption algorithm and a decryption algorithm is called a ....

a. Key

b. None of the above

c. Secret

d. Cipher

Your answer is correct.


The correct answer is:
Cipher

Previous activity
◄ Tugas: Attacks, Services And Mechanisms

Jump to...

https://ecourse.del.ac.id/mod/quiz/review.php?attempt=153539&cmid=26346 5/5

You might also like