0% found this document useful (0 votes)
120 views5 pages

(Update) Post Test Week 5 - Attempt Review

1) The document is a review of a post test taken on cryptography. It shows the test taker answered all 10 multiple choice questions correctly. 2) The test covered topics like the definitions of plaintext and ciphertext, cryptanalysis, classical cipher techniques like the Caesar cipher, and cryptographic concepts like keys, encryption, signatures, and security services. 3) The user received a perfect score of 10 out of 10 or 100% on the post test.

Uploaded by

Dita Noviyanti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views5 pages

(Update) Post Test Week 5 - Attempt Review

1) The document is a review of a post test taken on cryptography. It shows the test taker answered all 10 multiple choice questions correctly. 2) The test covered topics like the definitions of plaintext and ciphertext, cryptanalysis, classical cipher techniques like the Caesar cipher, and cryptographic concepts like keys, encryption, signatures, and security services. 3) The user received a perfect score of 10 out of 10 or 100% on the post test.

Uploaded by

Dita Noviyanti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

11/2/21, 2:31 PM [Update] Post Test Week 5: Attempt review

KEAMANAN SIBER IF-43-02 [DRB]


Dashboard / My courses / CII3E3-IF-43-02 / CLO 2 - Mampu menjelaskan konsep cryptography / [Update] Post Test Week 5

Started on Tuesday, 2 November 2021, 2:15 PM

State Finished

Completed on Tuesday, 2 November 2021, 2:30 PM

Time taken 15 mins

Marks 10.00/10.00

Grade 100.00 out of 100.00

Question 1

Correct

Mark 1.00 out of 1.00

What is the meaning of plaintext?

Select one:

a. Encoded message

b. Original cipher

c. the text which can’t be read directly

d. Original message 

The correct answer is: Original message

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=3236573&cmid=1616994 1/5
11/2/21, 2:31 PM [Update] Post Test Week 5: Attempt review

Question 2

Correct

Mark 1.00 out of 1.00

What is the meaning of ciphertext?

Select one:

a. The text which can’t be read directly 

b. Encoded cipher

c. Encoded cipher

d. Procedur / mechanism

The correct answer is: The text which can’t be read directly

Question 3

Correct

Mark 1.00 out of 1.00

Layanan keamanan yang menjamin entitas yang mengakses sistem adalah pihak yang benar-benar berhak adalah

Select one:

a. Confidentiality

b. Integrity

c. Availability

d. Authentication 

The correct answer is: Authentication

Question 4

Correct

Mark 1.00 out of 1.00

Which is the right statement about cryptanalysis?

Select one:

a. Study of methods of encipher a plaintext

b. Aims to secure the message

c. Based on the point of view of the plaintext owner

d. Focuses on revealing the ciphertext 

The correct answer is: Focuses on revealing the ciphertext

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=3236573&cmid=1616994 2/5
11/2/21, 2:31 PM [Update] Post Test Week 5: Attempt review

Question 5

Correct

Mark 1.00 out of 1.00

Berikut adalah contoh teknik enkripsi menggunakan classical cipher monoalphabetic substitution

Select one:

a. Vigenere

b. Caesar cipher 

c. Rail Fence

d. RC4

The correct answer is: Caesar cipher

Question 6

Correct

Mark 1.00 out of 1.00

If Alice wants to open an encrypted message from Bob, then she needs...

Select one:

a. Bob’s secret key

b. Bob’s public key

c. Alice’s secret key 

d. Alice’s public key

The correct answer is: Alice’s secret key

Question 7

Correct

Mark 1.00 out of 1.00

Cryptographic security must rely on the secrecy of the...

Select one:

a. Cipher

b. Ciphertext

c. Plaintext

d. Key 

The correct answer is: Key

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=3236573&cmid=1616994 3/5
11/2/21, 2:31 PM [Update] Post Test Week 5: Attempt review

Question 8

Correct

Mark 1.00 out of 1.00

If Bob wants to send an encrypted message to Alice, then he needs...

Select one:

a. Alice’s public key 

b. Bob’s secret key

c. Alice’s secret key

d. Bob’s public key

The correct answer is: Alice’s public key

Question 9

Correct

Mark 1.00 out of 1.00

If Bob wants to open an encrypted message from Alice, then he needs...

Select one:

a. Bob’s public key

b. Alice’s public key

c. Alice’s secret key

d. Bob’s secret key 

The correct answer is: Bob’s secret key

Question 10

Correct

Mark 1.00 out of 1.00

Layanan keamanan yang menjamin ketersediaan sumber daya dapat diakses kapanpun dan dimanapun adalah

Select one:

a. Confidentiality

b. Integrity

c. Availability 

d. Authentication

The correct answer is: Availability

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=3236573&cmid=1616994 4/5
11/2/21, 2:31 PM [Update] Post Test Week 5: Attempt review

Previous Activity

Jump to...

Next Activity

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=3236573&cmid=1616994 5/5

You might also like