IBA Chapter 8B

IBA Chapter 8B

8th - 12th Grade

16 Qs

quiz-placeholder

Similar activities

N+ Chapter 5

N+ Chapter 5

12th Grade

20 Qs

Y8 - Pre-Bebras

Y8 - Pre-Bebras

9th Grade

15 Qs

Year 10 Data Transmission

Year 10 Data Transmission

9th - 12th Grade

13 Qs

ETİK BİLGİ VE SİBER SUÇLAR

ETİK BİLGİ VE SİBER SUÇLAR

1st - 12th Grade

16 Qs

Internet Vocabulary

Internet Vocabulary

7th - 9th Grade

12 Qs

Year 9 Storage

Year 9 Storage

9th Grade

20 Qs

TN +2 -LESSON1 FUNCTIONS

TN +2 -LESSON1 FUNCTIONS

12th Grade

20 Qs

Topic 4.1 Introduction to Java

Topic 4.1 Introduction to Java

12th Grade

20 Qs

IBA Chapter 8B

IBA Chapter 8B

Assessment

Quiz

Computers

8th - 12th Grade

Hard

Created by

George Jenness

Used 122+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most common method for spreading viruses?

Swapping disks or drives

Opening attachments

Installing programs

Downloading files

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an unexpected e-mail with an attachment from a co-worker. You call the co-worker to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. Which of the following is your co-worker's best response to your question?

She should ask you to open the attachment and describe its contents.

She should ask you to forward the e-mail to her so she can open the attachment and check it.

She should ask you to forward the e-mail to your company's management.

She should ask you to read her the e-mail message including the full name of the attachment and its extension.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement best describes symmetric-key encryption?

An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message

An encryption method in which the same key is used to encrypt and decrypt a message

essage

D

An encryption method in which a key is required to encrypt data for storage and to verify its integrity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term is used to describe the process that converts data into an unreadable form of text?

Certification

Encryption

Authentication

Decryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The level of secrecy offered by encryption is dependent on:

whether or not the data you are encrypting is licensed.

the type of encryption used and the size of the key.

the transmission speed used to encrypt or decrypt data.

whether or not the data you are encrypting is copyrighted.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement best describes hash encryption?

An encryption method in which a key is required to encrypt data for storage and verify its integrity

An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message

An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

An encryption method in which the same key is used to encrypt and decrypt a message

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term is used to describe an application that installs hidden services on a system that enables the attacker to monitor and control the operation of the system?

Trojan

Worm

Virus

Illicit server

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?