Big Data and Privacy

Big Data and Privacy

10th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

CSP 2.1.5 Secure Protocols

CSP 2.1.5 Secure Protocols

9th - 12th Grade

13 Qs

Cryptography

Cryptography

10th Grade

15 Qs

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

12th Grade - University

15 Qs

Part C Unit 10 Practice Exam

Part C Unit 10 Practice Exam

9th - 12th Grade

10 Qs

OCR 1.5 Networks 1

OCR 1.5 Networks 1

11th Grade

10 Qs

OCR GCSE CS MCQ1 1.5 Networks (J276)

OCR GCSE CS MCQ1 1.5 Networks (J276)

9th - 10th Grade

10 Qs

Encryption - AQA A Level Computer Science

Encryption - AQA A Level Computer Science

11th - 12th Grade

10 Qs

Big Data & Cyber

Big Data & Cyber

9th - 12th Grade

15 Qs

Big Data and Privacy

Big Data and Privacy

Assessment

Quiz

Computers

10th - 12th Grade

Hard

Created by

K B

Used 61+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following most accurately describes Moore's Law:

Moore's Law describes a relationship of boolean logic statements involving AND and OR

Moore's Law is the principle that one should assume that any traffic on the Internet is insecure

Moore's Law is the observation that computing power tends to double every two years

Moore's Law explains why cracking modern cryptography is a "computationally hard" problem

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank of the following statement: "______ encryption is a method of encryption involving one key for both encryption and decryption."

Symmetric

Asymmetric

Public Key

SSL

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Pick the two expressions involving the Modulo operation that compute to the exact same value (choose 2)

9 MOD 8

1 MOD 16

52 MOD 32

9 MOD 64

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption to encrypt their customers' credit card information. Is this a secure form of payment?

No, public key encryption allows the credit card information to be read by the public.

No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear".

Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.

Yes, public key encryption is secure because it transmits credit card information in binary.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements best describes the properties of public key encryption?

Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information.

Public key encryption is a highly secure encryption scheme that in which a single shared key is used by both the sender and receiver of the message.

Public key encryption makes use of certain types of problems which are easier for humans to solve than computers.

Public key encryption makes use of mathematical problems which no algorithm can be used to solve.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the answer that is NOT a feature of Public Key Cryptography:

A key for decrypting is never made public

Using public key guarantees that only the intended recipient can decrypt the message

A Public Key database ensures 3rd party accountability of security

Allows secure communication without establishing a *shared* encryption key ahead of time.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the programmer's choices in designing the structure of the system?

Maintaining privacy of the information stored in the data set.

Scalability of the system.

Structuring the metadata of the information for analysis.

The frequency of a particular item occurring in a data set.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?