
Encrytpion of Data
Presentation
•
Information Technology (IT)
•
Vocational training
•
Practice Problem
•
Medium
Adetokunbo Oloyede
Used 2+ times
FREE Resource
27 Slides • 30 Questions
1
2
3
4
5
6
Open Ended
Why is it important to protect data and information using encryption, protocols, and digital certificates?
7
Multiple Choice
Which of the following is NOT a purpose of encryption methods in information technology systems?
Protecting data during transmission
Securing stored data
Improving data storage speed
Ensuring data privacy
8
Multiple Choice
Which of the following is NOT a method used to decrypt the encrypted messages shown in the starter activity?
Reading top to bottom
Reversing each word
Changing each letter to the previous in the alphabet
Counting the number of words
9
Multiple Choice
Used in public key encryption, ____________________ Encryption is a scheme in which the key to encrypt data is different from the key to decrypt.
Private Key
Asymmetric
Public Key
Symmetric
10
Multiple Choice
Choose the answer that is NOT a feature of Public Key Cryptography:
Using public key guarantees that only the intended recipient can decrypt the message
A Public Key database ensures 3rd party accountability of security
Allows secure communication without establishing a *shared* encryption key ahead of time.
A key for decrypting is never made public
11
Open Ended
Explain why encryption is important for data communications over the Internet.
12
13
Multiple Choice
Which of the following terms refers to the original message before encryption?
Ciphertext
Key
Plaintext
Encryption algorithm
14
15
Fill in the Blanks
Type answer...
16
17
Multiple Select
Select all statements that are true about private key encryption.
It uses a single key for both encryption and decryption.
The key must be shared with the recipient.
It is also known as asymmetric encryption.
The key must be transferred between communicating devices.
18
19
Multiple Choice
What is a man in the middle attack and how does it compromise communication security?
It allows attackers to intercept and alter messages between two parties.
It encrypts messages to protect them from attackers.
It ensures only the sender and recipient can read the message.
It prevents attackers from accessing the communication channel.
20
21
Open Ended
Explain the difference between a public key and a private key in encryption.
22
23
Multiple Select
Which of the following statements about public key encryption are correct?
A public key is used for encrypting messages.
A private key is used for decrypting messages.
Both keys are available to everyone.
The recipient's private key is needed to read the message.
24
25
Fill in the Blanks
Type answer...
26
27
Open Ended
Why should passwords always be stored encrypted in databases?
28
29
Open Ended
What is the problem with storing all passwords for every user in one database and how can this be solved?
30
31
Multiple Choice
Which statement best describes the purpose of a hashing algorithm?
It stores the original password in plaintext.
It allows the password to be restored from the hash.
It produces a small amount of text that represents the password or file.
It encrypts the password for secure transmission.
32
33
Open Ended
Explain how encryption protects data on mobile devices and why it is important.
34
35
Open Ended
What were the main arguments presented by Apple and the FBI in the 2016 dispute over unlocking an iPhone, and what are the implications for user privacy and law enforcement?
36
37
Fill in the Blanks
Type answer...
38
39
Multiple Select
Which of the following are true about protocols in data communication?
Protocols are optional for device communication.
Protocols define rules for how data is communicated.
HTTP is a protocol used to access web pages.
Protocols are only used for wireless communication.
40
41
Open Ended
How does HTTPS improve the security of data transmitted between a web browser and a website?
42
43
44
Open Ended
Describe the importance of HTTPS for websites that handle confidential information, referencing both user experience and security.
45
Multiple Choice
Which protocol is the successor to SSL for encrypted web connections?
TLS
WEP
WPA2
HTTPS
46
47
Fill in the Blanks
Type answer...
48
49
Multiple Choice
What might a browser message 'Can't connect securely to this page' indicate about a website's certificate?
The certificate is out of date or badly configured
The website is using HTTPS
The website is using WPA3
The website is safe to use
50
51
Open Ended
Explain how a digital certificate helps establish a secure connection between a user and a website host.
52
53
Multiple Select
Which of the following are considered secure wireless encryption protocols?
WEP
WPA2
WPA3
SSL
54
55
Fill in the Blanks
Type answer...
56
Open Ended
Reflecting on today's lesson about encryption, protocols, and digital certificates, what is one question you still have or a topic you would like to explore further?
57
Open Ended
Choose three of the following words from this lesson and write three questions where the answers will be those words.
Show answer
Auto Play
Slide 1 / 57
SLIDE
Similar Resources on Wayground
56 questions
REPORTED SPEECH REVIEW
Presentation
•
KG
51 questions
Copy of G1_K7_L7_22-23
Presentation
•
KG - Professional Dev...
52 questions
Food Groups
Presentation
•
KG - Professional Dev...
56 questions
HATING KAPATID- Session 5
Presentation
•
KG
52 questions
SIDI and IBIQ
Presentation
•
Professional Development
52 questions
Untitled Presentation
Presentation
•
Professional Development
48 questions
POPULAR MEMBER SERVICES DIAGNOSTICS, HOSPITILIZATION AND SURGERY
Presentation
•
KG
52 questions
Design Pattern - Presentazione e Autovalutazione
Presentation
•
Professional Development
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade