placeholder image to represent content

TELEHEALTH TECHNOLOGY QUIZ - 10

Quiz by kalaivani balamurugan

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
5 questions
Show answers
  • Q1
    Art of transforming messages to make them secure and immune to attacks.
    Cryptography
    Stenography
    Chryptoghraphy
    Stechnography
    30s
  • Q2
    List the two attacks in security attacks.
    Action attack Passive attack
    Active attack Personal attack
    Active attack Passive attack
    Aggressive attack Passive attack
    30s
  • Q3
    The content of their communication is not altered, either maliciously or by accident, in transmission is called ____________.
    Confidential
    Authenticate
    Data Integrity
    Repudiation
    30s
  • Q4
    The Keys available in Cryptography.
    Secret
    Public
    Private
    All Of These
    30s
  • Q5
    Asymmetric key involved with ______keys.
    Both - Private and Public key
    Public key
    None Of These
    Private key
    30s

Teachers give this quiz to your class