Information Technology: The Development, Installing and use of Anything to do With Computing and Telecommunications

This is a computer science engineering quiz on computer fundamentals, which includes questions on information technology.

download.jpg
Start Quiz

The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.

Artificial Intelligence ML Network Security IT

Network Security provides authentication and access control for resources.

True False

Which is not an objective of network security?

Identification Authentication Access control Lock

Which of these is a part of network identification?

UserID Password OTP fingerprint

The process of verifying the identity of a user.

Authentication Identification Validation Verification

CHAP stands for?

Challenge Handshake authentication protocol Challenge Hardware authentication protocol Circuit Hardware authentication protocol Circuit Handshake authentication protocol

Security features that control that can access resources in the OS.

Authentication Identification Validation Access control

An algorithm in encryption is called _____________

Algorithm Procedure Cipher Module

The information that gets transformed in encryption is ____________

Plain text Parallel text Encrypted text Decrypted text

A cipher in which the order is not preserved.

Polyalphabetic substitution based Transposition-based Substitution based Public key based

A unique piece of information that is used in encryption.

Cipher Plain Text Key Cipher

Study of creating a d using encryption and decryption techniques.

Cipher Cryptography Encryption Decryption

An algorithm used in encryption is referred to as cipher.

True False

A process of making the encrypted text readable again.

Decryption Encryption Network Security Information Hiding

The process of transforming plain text into unreadable text.

Decryption Encryption Network Security Information Hiding
Quiz/Test Summary
Title: Information Technology: The Development, Installing and use of Anything to do With Computing and Telecommunications
Questions: 15
Contributed by:
james