
AP CSP Unit 4 Review
Authored by Jennifer Sullivan
Computers
10th - 12th Grade
Used 67+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
33 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following most accurately describes Moore's Law:
Moore's Law describes a relationship of boolean logic statements involving AND and OR
Moore's Law is the principle that one should assume that any traffic on the Internet is insecure
Moore's Law is the observation that computing power tends to double every two years
Moore's Law explains why cracking modern cryptography is a "computationally hard" problem
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Fill in the blank of the following statement: "______ encryption is a method of encryption involving one key for both encryption and decryption."
Symmetric
Asymmetric
Public Key
SSL
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption to encrypt their customers' credit card information. Is this a secure form of payment?
No, public key encryption allows the credit card information to be read by the public.
No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear".
Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.
Yes, public key encryption is secure because it transmits credit card information in binary.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following statements best describes the properties of public key encryption?
Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information.
Public key encryption is a highly secure encryption scheme that in which a single shared key is used by both the sender and receiver of the message.
Public key encryption makes use of certain types of problems which are easier for humans to solve than computers.
Public key encryption makes use of mathematical problems which no algorithm can be used to solve.
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Choose the answer that is NOT a feature of Public Key Cryptography:
A key for decrypting is never made public
Using public key guarantees that only the intended recipient can decrypt the message
A Public Key database ensures 3rd party accountability of security
Allows secure communication without establishing a *shared* encryption key ahead of time.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
What is a Distributed Denial of Service (DDoS) attack?
A coordinated effort by a group to simultaneously attempt to gain entry to foreign government's servers or systems
An effort by network engineers to focus all systems on catching a user or computer that has illegally gained access.
An attempt to compromise a single target by flooding it with requests from multiple systems.
An attempt to harass or extort all customers of one or more Internet Service Providers (ISPs).
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following scenarios is most characteristic of a phishing attack.
You accidentally run a piece of code that automatically spreads from one computer to another, exploiting a common vulnerability
You get an email from the IT support desk that asks you to send a reply email with your username and password to verify your account
You get an unwanted email trying to sell you a low quality product or service that seems "fishy."
You accidentally install a piece of software that monitors your activity to steal personal information like your passwords, date of birth, social security number, etc.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
30 questions
Microsoft Access Intro
Quiz
•
9th - 12th Grade
35 questions
ICTSM SEM-2 MOD-7 : Laptop
Quiz
•
10th Grade
28 questions
4QICT12 - Current and Future Trends of Media and Information
Quiz
•
11th - 12th Grade
30 questions
EMPOWERMENT TECHNOLOGIES WEEK 3 LONG QUIZ
Quiz
•
11th Grade
36 questions
PARTS OF COMPUTER TEST
Quiz
•
12th Grade
30 questions
AD S2 G360s Week 9 -2021
Quiz
•
12th Grade
32 questions
BÀI 17. BIẾN VÀ LỆNH GÁN
Quiz
•
10th Grade
30 questions
EDUCACION ARTISTICA 4TO SECUNDARIA-TAREA
Quiz
•
4th - 10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade