Search Header Logo
Ch15 : Encryption

Ch15 : Encryption

Assessment

Presentation

•

Computers

•

10th Grade

•

Practice Problem

•

Medium

Created by

Ala Jaber

Used 4+ times

FREE Resource

31 Slides • 35 Questions

1

media

2

media

3

Multiple Choice

What is the difference between asymmetric and symmetric encryption?

1

Asymmetric uses two keys, symmetric uses one key

2

Asymmetric is faster than symmetric

3

Symmetric is more secure than asymmetric

4

Asymmetric is used for HTTPS connections

4

Multiple Choice

What must a user need to decrypt a file?

1

Coin

2

Key

3

Token

4

Graph

5

Multiple Choice

What is the purpose of data encryption?

1

To speed up data transfer

2

To make data unreadable to unauthorized users

3

To reduce the amount of data storage needed

4

To make data easier to read

6

Multiple Choice

"______ encryption is a method of encryption involving one key for both encryption and decryption."

1

Private Key

2

Symmetric

3

Asymmetric

4

Public Key

7

Multiple Choice

Which process involves transforming ciphertext into plaintext using a key

1
encryption
2
scrambling
3
decryption
4
encoding

8

Drag and Drop

There are 2 main types of data encryption. ​
encryption is where data is encrypted and decrypted using the same ​
. ​
encryption uses 2 different keys, a ​
key for encrypting data that anyone can know and a ​
key used for decryption that must be kept private!
Drag these tiles and drop them in the correct blank above
symmetric
key
asymmetric
public
private
password
authentication
hacker

9

media

10

media
media

11

Multiple Choice

Plan a strategy to decode a Pigpen Cipher message without a key.

1

Use frequency analysis to determine common symbols.

2

Randomly guess the letters.

3

Use a computer program to brute force the message.

4

Look for patterns and common words in the symbols.

12

Multiple Choice

Question image

What is encryption?

1

A person who tricks you into giving your password

2

converting information or data into a code to prevent unauthorized access.

3

To upload your personal data to the cloud

4

When there is a security breach in your data

13

Multiple Select

Question image

What does Encryption Mean? (Select two answers)

1

That data can no longer be read without the key

2

That data is secure

3

That data has been lost

4

That data is changed

14

Match

Match the following

The same key is used to encrypt and decrypt the message.

Different keys are used to encrypt and decrypt the message.

Key shared with everybody used to encrypt a message.

Key that can only be decrypted by a computer with access.

Symmetric

Asymmetric

Public Key

Private Key

15

media

16

Multiple Choice

Compare the Pigpen Cipher to the Caesar Cipher. Which statement is true?

1

Both ciphers use geometric symbols.

2

The Pigpen Cipher is more secure than the Caesar Cipher.

3

The Caesar Cipher shifts letters, while the Pigpen Cipher uses symbols.

4

Both ciphers were used by the Freemasons.

17

media

18

Multiple Choice

In a Caesar cipher with a key of –3, what happens to the letters of the alphabet?

1

a) They are shifted three places to the right

2

b) They are replaced with numbers

3

c) They are shifted three places to the left

4

d) They are arranged in random order

19

Multiple Choice

To decrypt a Caesar cipher, the letters are shifted in the same direction as encryption.

1

True

2

False

20

media

21

media

22

Multiple Choice

What is the purpose of the Caesar cipher algorithm?

1

To encrypt messages

2

To decrypt messages

3

To both encrypt and decrypt messages

4

To analyze strings

23

media

24

Multiple Choice

What is the first step in the flowchart for setting out a Caesar cipher?

1

Input 'e' for encryption

2

Input 'd' for decryption

3

Input shift to be used

4

Input message to be encrypted or decrypted

25

media

26

Multiple Choice

What are the sub-problems that your program needs to address when checking user input?

1

Checking if the input is empty

2

Traversing the string

3

Handling upper and lower case letters

4

Leaving characters as they are

27

media

28

Multiple Choice

What will happen if the key is +3 and the letter to be encoded is 'X'?

1

It will encrypt to 'A'

2

It will encrypt to 'B'

3

It will encrypt to 'C'

4

It will encrypt to 'D'

29

media

30

Multiple Choice

What are the steps involved in using functions for structured programming?

1

Ask the user for the key

2

Ask the user for the message

3

Carry out the encryption or decryption

4

Ask the user if they want to encrypt or decrypt

31

media

32

Multiple Choice

What values do the functions return that are used by the main program?

1

Get method

2

Get key

3

Get message

4

Decrypt message

33

Multiple Choice

______________ is/are Programs designed by dividing problems into smaller, logical problems to make them easier to execute. 

1
Structured Programming
2
Computer
3
Data
4
Programming

34

Multiple Choice

Creating a sequence of instructions to enable the computer to do something.
1
Structured Programming
2
Computer
3
Data
4
Programming

35

media

36

Multiple Choice

What does the variable 'run' control in the given code?

1

The method of encryption

2

The loop execution

3

The key for encryption

4

The message to display

37

media

38

Multiple Choice

What is the Vigenère cipher based on?

1

Polyalphabetic substitution

2

Single alphabet substitution

3

Transposition

4

None of the above

39

media

40

Multiple Choice

What is the Vigenère cipher used for?

1

Encrypting messages

2

Decrypting messages

3

Both encrypting and decrypting messages

4

None of the above

41

media

42

media

43

media

44

media

45

Multiple Choice

What is the term used to refer to the original message before encryption?

1

Ciphertext

2

Plaintext

3

Keyword

4

Encryption

46

Multiple Choice

What is the purpose of the keyword in developing a keystream?

1

To encrypt the plaintext

2

To generate the keystream

3

To decode the message

4

To create a cipher

47

Multiple Choice

What is the ciphertext for the plaintext 'this is a message' using the keystream 'code'?

1

VVLW KW D QGGVEIS

2

VVLW KW D QGGVEIS

3

VVLW KW D QGGVEIS

4

VVLW KW D QGGVEIS

48

media

49

media

50

media

51

Multiple Choice

Question image

What is the process of changing plain text into a cipher for the purpose of security or privacy?

1

Denial of Service

2

Encryption

3

Endpoint Protection Platform

4

Digital Signature

52

media

53

media

54

media

55

media

56

Multiple Choice

Question image

What is the encrypted ciphertext when using the rail fence cipher with a key of 4?

1

taghsmaeiiesss

2

tieghsssmsaeias

3

taghsmaeisss

4

tieghsssmseaias

57

Multiple Choice

Question image

What is the key used to encrypt the message in the rail fence cipher?

1

2

2

3

3

4

4

5

58

Multiple Choice

What are the stages of filling in the letters of the ciphertext to decrypt the message?

1

Stage 1

2

Stage 2

3

Stage 3

4

Stage 4

59

media

60

Multiple Choice

What type of key can be freely shared with anyone so that they can encrypt a message?
1
Personal key
2
Private key
3
Free key
4
Public key

61

Multiple Choice

If the same key is used to encrypt and decrypt a message, this is known as? 
1
Symmetric encryption
2
Encryption doesn't exist!
3
Asymmetric encryption
4
Same-key encryption

62

Multiple Choice

Explain the difference between encryption and decryption.

1

Encryption converts plaintext to ciphertext, while decryption converts ciphertext to plaintext.

2

Encryption is used for compressing data, while decryption is used for decompressing data.

3

Encryption converts ciphertext to plaintext, while decryption converts plaintext to ciphertext.

4

Encryption and decryption are the same process.

63

media

64

media

65

media

66

Poll

How confident do you feel about this topic now?

Very confident
Somewhat confident
Not confident
media

Show answer

Auto Play

Slide 1 / 66

SLIDE