CSF 6.7 Assessment Review - Cryptology

CSF 6.7 Assessment Review - Cryptology

Assessment

Flashcard

Computers

9th - 12th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

9 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which image best portrays your current mood?

Back

undefined

2.

FLASHCARD QUESTION

Front

The art of making and breaking code is called what?

Back

Cryptography

Answer explanation

The correct answer is:

Cryptography

Explanation: Cryptography is the practice and study of techniques for secure communication in the presence of third parties, often referred to as adversaries. It involves creating and analyzing protocols that prevent third parties from reading private messages, ensuring secure communication, and data integrity. Cryptography includes both encryption (making code) and decryption (breaking code) techniques.

Incorrect Answers:

  1. Encryption in-transit: Encryption in-transit refers to the process of encrypting data while it is being transmitted over a network. It ensures that data remains secure and private while in transit between two communicating parties. However, it specifically focuses on protecting data during transmission and does not encompass the broader concept of cryptography, which includes both encryption and decryption techniques.

  2. Encryption at-rest: Encryption at-rest involves encrypting data stored on physical or digital storage devices, such as hard drives, solid-state drives, or databases. It ensures that data remains secure and protected even when it is not actively being used. Like encryption in-transit, encryption at-rest is a specific application of cryptography focused on protecting data at rest, but it does not encompass the entirety of the field of cryptography.

  3. Decryption: Decryption is the process of converting encrypted data back into its original, readable form. While decryption is an essential component of cryptography, particularly for authorized parties to access encrypted data, it specifically refers to the reverse process of encryption. It is not the art of making and breaking code itself but rather the process of reversing encryption to retrieve the original plaintext from encrypted data.


3.

FLASHCARD QUESTION

Front

Which of the following is true about encryption in transit? Options: It encrypts data at rest, protecting it from unauthorized access. It encrypts data as it moves between two systems, protecting it from interception during transit. It encrypts data as it is being processed by a computer, protecting it from malicious code. It encrypts data stored in the cloud, protecting it from unauthorized access.

Back

It encrypts data as it moves between two systems, protecting it from interception during transit.

Answer explanation

The correct answer is:

It encrypts data as it moves between two systems, protecting it from interception during transit.

Explanation: Encryption in transit involves encrypting data as it is transmitted between two systems or devices over a network. This process ensures that data remains secure and protected from interception by unauthorized parties while it is in motion.

Let's address the incorrect options:

  1. It encrypts data at rest, protecting it from unauthorized access: This statement describes encryption at rest rather than encryption in transit. Encryption at rest involves encrypting data when it is stored on physical or digital storage devices to protect it from unauthorized access when not in use.

  2. It encrypts data as it is being processed by a computer, protecting it from malicious code: This statement refers to another concept known as runtime encryption or memory encryption, which involves encrypting data while it is being processed by a computer's CPU or memory to protect it from malicious code or unauthorized access. It does not specifically relate to encryption in transit.

  3. It encrypts data stored in the cloud, protecting it from unauthorized access: This statement describes encryption at rest rather than encryption in transit. While data stored in the cloud may indeed be encrypted to protect it from unauthorized access when stored on cloud servers, encryption in transit specifically pertains to encrypting data as it moves between systems over a network.

4.

FLASHCARD QUESTION

Front

Which of the following best describes encryption at rest? Options: It encrypts data as it moves between two systems, protecting it from interception during transit. It encrypts data stored in a computer's memory, protecting it from unauthorized access. It encrypts data as it is being processed by a computer, protecting it from malicious code. It encrypts data stored on a device or server, protecting it from unauthorized access.

Back

It encrypts data stored on a device or server, protecting it from unauthorized access.

Answer explanation

Here are explanations for the other incorrect answers:

Encryption in transit: It encrypts data as it moves between two systems, protecting it from interception during transit. This is the correct definition of encryption in transit. It is used to protect data as it travels over a network, such as the internet, from being intercepted and read by unauthorized third parties.

Encryption in memory: It encrypts data stored in a computer's memory, protecting it from unauthorized access. While it is important to protect data in memory, it is not referred to as encryption at rest. Encryption in memory is used to protect sensitive data, such as passwords and encryption keys, from being accessed by unauthorized processes running on the same computer.

Encryption in processing: It encrypts data as it is being processed by a computer, protecting it from malicious code. Encryption in processing is not a common term, but there are techniques used to protect data during processing, such as homomorphic encryption. However, it is not considered encryption at rest.

5.

FLASHCARD QUESTION

Front

The first form of cryptography can be traced back to when?

Back

Egyptians with hieroglyphics

Answer explanation

The first form of cryptography can be traced back to the Egyptians with hieroglyphics. They used simple substitution ciphers to encode their messages, and this is considered to be one of the earliest known examples of cryptography. The Egyptians used hieroglyphics to convey secret messages, but they also used them for non-secret communications, such as religious texts and historical records. The other options mentioned in the question are not accurate in terms of the history of cryptography. ARPANET and the World Wide Web are both related to the development of the internet, but they are not directly related to the history of cryptography. The Cold War also played a significant role in the development of modern cryptography, but it did not mark the beginning of cryptography as a practice.

6.

FLASHCARD QUESTION

Front

What are the two types of methods to encrypt data?

Back

symmetric and asymmetric

Answer explanation

The correct answer is:

Symmetric and asymmetric

Explanation:

  1. Symmetric encryption: Symmetric encryption, also known as secret-key encryption, involves the use of a single key for both encryption and decryption of data. The same key is used by both the sender and the recipient to encrypt and decrypt messages. Symmetric encryption algorithms are typically faster and more efficient than asymmetric encryption but require a secure method for exchanging the secret key.

  2. Asymmetric encryption: Asymmetric encryption, also known as public-key encryption, utilizes a pair of keys: a public key and a private key. The public key is used for encryption, while the private key is used for decryption. The public key can be freely distributed, allowing anyone to encrypt messages intended for the owner of the private key, but only the owner of the private key can decrypt these messages. Asymmetric encryption provides a secure method for exchanging messages without the need for a shared secret key. However, it is generally slower and more computationally intensive than symmetric encryption.

7.

FLASHCARD QUESTION

Front

A process of converting encrypted data into a form that is readable and understood by a human or a computer is called?

Back

decryption

Answer explanation

Decryption

Explanation:

Decryption is the process of converting encrypted data back into its original, readable form. It involves using a decryption key or algorithm to reverse the encryption process and recover the plaintext from the ciphertext. Decryption is the opposite of encryption, which transforms plaintext into ciphertext to secure data.

8.

FLASHCARD QUESTION

Front

End-to-end encryption does what?

Back

ensures the communication is private and it can not be accessed by anyone else

Answer explanation

End-to-end encryption ensures the communication is private and it cannot be accessed by anyone else except the intended recipient. End-to-end encryption is a security feature that protects the content of messages, emails, and other forms of digital communication from interception by anyone, including cybercriminals, government agencies, and service providers. With end-to-end encryption, only the sender and the recipient can access the content of the communication, and nobody in between can read, modify or access it. This provides an additional layer of privacy and security for users and is widely used in secure messaging apps and email services. Therefore, the correct answer is: "Ensures the communication is private and it cannot be accessed by anyone else."

9.

FLASHCARD QUESTION

Front

How confident do you feel about this topic?

Back

Very confident, Mostly confident, Somewhat confident, Not confident at all