Professional Documents
Culture Documents
Exam 20230906 17525
Exam 20230906 17525
Exam 20230906 17525
(2 - 3)
06/09/2023 :ﺍﻟﺘﺄﺭﻳﺦ ﺟﺎﻣﻌﺔ ﺍﻟﻌﻠﻮﻡ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ
ﺃﻣﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ:ﺍﻟﻤﻘﺮﺭ ﻛﻠﻴﺔ ﺍﻟﺤﺎﺳﺒﺎﺕ ﻭﺍﻟﻤﻌﻠﻮﻣﺎﺕ
ﻓﻬﺪ ﺁﻝ ﻗﺎﺳﻢ:ﺍﻟﻤﺪﺭﺱ ﻗﺴﻢ ﺗﻘﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ
ﺳﺎﻋﺔ ﻭﺍﺣﺪﺓ:ﺍﻟﺰﻣﻦ ﺑﺮﻧﺎﻣﺞ ﺗﻘﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ
a. cryptography. b. stagnography.
c. ciphertext. d. cryptoanalysis.
36. public key encryption is used ................. amount of data.
a. large. b. best.
c. bad. d. small.
37. One of the following is not from the limitations of cryptography
a. lightweight devices. b. computational overhead.
c. entropy. d. speed.
38. Hiding the content of data is one of crytpography goals by using ..................... techniques.
a. obfuscation. b. lightweight.
c. decryption. d. encryption .
39. Public key encryption algorithm can used in low-power devices such as .......................
a. ECC. b. DSA.
c. AES. d. RSA.
40. One of the following is not a public key encryption algorithm.
a. AES. b. DSA.
c. ECC. d. RSA.
(3 - 3)