Search Header Logo
Encrytpion of Data

Encrytpion of Data

Assessment

Presentation

Information Technology (IT)

Vocational training

Practice Problem

Medium

Created by

Adetokunbo Oloyede

Used 2+ times

FREE Resource

27 Slides • 30 Questions

1

media

2

media

3

media

4

media

5

media

6

Open Ended

Why is it important to protect data and information using encryption, protocols, and digital certificates?

7

Multiple Choice

Which of the following is NOT a purpose of encryption methods in information technology systems?

1

Protecting data during transmission

2

Securing stored data

3

Improving data storage speed

4

Ensuring data privacy

8

Multiple Choice

Which of the following is NOT a method used to decrypt the encrypted messages shown in the starter activity?

1

Reading top to bottom

2

Reversing each word

3

Changing each letter to the previous in the alphabet

4

Counting the number of words

9

Multiple Choice

Used in public key encryption, ____________________ Encryption is a scheme in which the key to encrypt data is different from the key to decrypt.

1

Private Key

2

Asymmetric

3

Public Key

4

Symmetric

10

Multiple Choice

Choose the answer that is NOT a feature of Public Key Cryptography:

1

Using public key guarantees that only the intended recipient can decrypt the message

2

A Public Key database ensures 3rd party accountability of security

3

Allows secure communication without establishing a *shared* encryption key ahead of time.

4

A key for decrypting is never made public

11

Open Ended

Explain why encryption is important for data communications over the Internet.

12

media

13

Multiple Choice

Which of the following terms refers to the original message before encryption?

1

Ciphertext

2

Key

3

Plaintext

4

Encryption algorithm

14

media

15

Fill in the Blanks

Type answer...

16

media

17

Multiple Select

Select all statements that are true about private key encryption.

1

It uses a single key for both encryption and decryption.

2

The key must be shared with the recipient.

3

It is also known as asymmetric encryption.

4

The key must be transferred between communicating devices.

18

media

19

Multiple Choice

What is a man in the middle attack and how does it compromise communication security?

1

It allows attackers to intercept and alter messages between two parties.

2

It encrypts messages to protect them from attackers.

3

It ensures only the sender and recipient can read the message.

4

It prevents attackers from accessing the communication channel.

20

media

21

Open Ended

Explain the difference between a public key and a private key in encryption.

22

media

23

Multiple Select

Which of the following statements about public key encryption are correct?

1

A public key is used for encrypting messages.

2

A private key is used for decrypting messages.

3

Both keys are available to everyone.

4

The recipient's private key is needed to read the message.

24

media

25

Fill in the Blanks

Type answer...

26

media

27

Open Ended

Why should passwords always be stored encrypted in databases?

28

media

29

Open Ended

What is the problem with storing all passwords for every user in one database and how can this be solved?

30

media

31

Multiple Choice

Which statement best describes the purpose of a hashing algorithm?

1

It stores the original password in plaintext.

2

It allows the password to be restored from the hash.

3

It produces a small amount of text that represents the password or file.

4

It encrypts the password for secure transmission.

32

media

33

Open Ended

Explain how encryption protects data on mobile devices and why it is important.

34

media

35

Open Ended

What were the main arguments presented by Apple and the FBI in the 2016 dispute over unlocking an iPhone, and what are the implications for user privacy and law enforcement?

36

media

37

Fill in the Blanks

Type answer...

38

media

39

Multiple Select

Which of the following are true about protocols in data communication?

1

Protocols are optional for device communication.

2

Protocols define rules for how data is communicated.

3

HTTP is a protocol used to access web pages.

4

Protocols are only used for wireless communication.

40

media

41

Open Ended

How does HTTPS improve the security of data transmitted between a web browser and a website?

42

media

43

media

44

Open Ended

Describe the importance of HTTPS for websites that handle confidential information, referencing both user experience and security.

45

Multiple Choice

Which protocol is the successor to SSL for encrypted web connections?

1

TLS

2

WEP

3

WPA2

4

HTTPS

46

media

47

Fill in the Blanks

Type answer...

48

media

49

Multiple Choice

What might a browser message 'Can't connect securely to this page' indicate about a website's certificate?

1

The certificate is out of date or badly configured

2

The website is using HTTPS

3

The website is using WPA3

4

The website is safe to use

50

media

51

Open Ended

Explain how a digital certificate helps establish a secure connection between a user and a website host.

52

media

53

Multiple Select

Which of the following are considered secure wireless encryption protocols?

1

WEP

2

WPA2

3

WPA3

4

SSL

54

media

55

Fill in the Blanks

Type answer...

56

Open Ended

Reflecting on today's lesson about encryption, protocols, and digital certificates, what is one question you still have or a topic you would like to explore further?

57

Open Ended

Choose three of the following words from this lesson and write three questions where the answers will be those words.

media

Show answer

Auto Play

Slide 1 / 57

SLIDE