Module 3 Quiz - Security Engineering_ Information Security.Fall2019 - Module 3 Quiz Security Engineering Information Security.Fall2019 Module 3 Quiz

Module 3 Quiz - Security Engineering_ Information Security.Fall2019

This preview shows page 1 - 4 out of 16 pages.

11/10/2019 Module 3 Quiz - Security Engineering: Information Security.Fall2019 1/16 Module 3 Quiz - Security Engineering Due Nov 10 at 11:59pm Points 100 Questions 25 Available Nov 4 at 12am - Nov 10 at 11:59pm 7 days Time Limit 90 Minutes Instructions A±empt History Attempt Time Score LATEST Attempt 1 67 minutes 64 out of 100 Score for this quiz: 64 out of 100 Submitted Nov 10 at 6:33pm This attempt took 67 minutes. You may only take the quiz once. Find the detailed information in Module 3 Quiz instruction . Click the Take the Quiz button below to begin the quiz. 0 / 4 pts Question 1The strength of all cryptographically based mechanisms lies in large part inwhich of the following? The strength of the key size The protection provided to secret key material The security of communication protocol The strength of the cryptographic algorithm orrect Answer orrect Answer You Answered You Answered 4 / 4 pts Question 2
11/10/2019 Module 3 Quiz - Security Engineering: Information Security.Fall2019 2/16 A birthday attack is targeted at which of the following? Correct! Correct! 4 / 4 pts Question 3Asymmetric authentication is susceptible to known attacks due to which ofthe following? Correct! Correct!
11/10/2019 Module 3 Quiz - Security Engineering: Information Security.Fall2019 3/16

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture