0% found this document useful (0 votes)
108 views2 pages

3 IT18 Information Assurance and Security 2 Prelim Exam

This document contains a preliminary examination for an Information Assurance and Security course. It has three sections - fill in the blank with missing words, multiple choice questions to select the correct answer, and short explanations of different types of attacks. The exam is testing students' knowledge of key concepts related to cryptography including encryption, decryption, ciphers, cryptanalysis, and different security threats. It will be used to evaluate students in the course on their understanding of these foundational information security topics.

Uploaded by

sarah miingg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
108 views2 pages

3 IT18 Information Assurance and Security 2 Prelim Exam

This document contains a preliminary examination for an Information Assurance and Security course. It has three sections - fill in the blank with missing words, multiple choice questions to select the correct answer, and short explanations of different types of attacks. The exam is testing students' knowledge of key concepts related to cryptography including encryption, decryption, ciphers, cryptanalysis, and different security threats. It will be used to evaluate students in the course on their understanding of these foundational information security topics.

Uploaded by

sarah miingg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Republic of the Philippines

Commission on Higher Education


SISTECH COLLEGE OF SANTIAGO CITY, INC.
Villasis, Santiago City, Isabela, 3311 Philippines

IT18 INFORMATION ASSURANCE AND SECURITY 2


Preliminary Examination

Name: ________________________________ Year Level: _____________________


Course: _______________________________ Score : _____________________

Fill in the blank. Fill the missing word or fill what is being describe.(2 pts each)
1. The collection of tools designed to protect data and to thwart hackers is called
______________
2. ______________ measures to protect data during their transmission
3. ______________ measures to protect data during their transmission over a
collection of interconnected networks
4. Any action that compromises the security of information owned by an organization
called ______________
5. ______________ is the art or science encompassing the principles and methods of
transforming an intelligible message into one that is unintelligible, and then retransforming
that message back to its original form
6. ______________ An algorithm for transforming an intelligible message into one
that is unintelligible by transposition and/or substitution methods
7. The process of converting plaintext to cipher text using a cipher and a key is called
______________ is the he original intelligible message
8. The process of converting cipher text back into plaintext using a cipher and a key is called
______________ .
9. ______________ is an algorithm for transforming an intelligible message into an
unintelligible one using a code-book

II. Multiple Choice. Select the correct answer. Write the letter only.

1. Any action that compromises the security of information owned by an organization.


a. Security attack b. Interruption c. Modification d. Fabrication

2. The study of principles and methods of transforming an unintelligible message back


into an intelligible message without knowledge of the key
a. Decipher b. Cipher c. Cryptanalysis d. Cryptography

3. The art or science encompassing the principles and methods of transforming an


intelligible message into one that is unintelligible, and then retransforming that
message back to its original form
a. Decipher b. Cipher c. Cryptanalysis d. Cryptography

4. The process of converting cipher text back into plaintext using a cipher and a key
a. Decipher b. Cipher c. Cryptanalysis d. Cryptography

5. The algorithm for transforming an intelligible message into one that is unintelligible
by transposition and/or substitution methods
a. Decipher b. Cipher c. Cryptanalysis d. Cryptography
III. INTERPRETATION. Explain the flow of information and how hackers attacks from
sender to the reciever by using the following method. (5pts each)

II. Interruption

III. Modification

IV. Fabrication

Prepared by: Checked by:

NELSON D. COSTALES AMELIA J. BANIQUED, MSIT


Instructor College Dean

You might also like