Search Header Logo

AP CSP (encryption)

Authored by Anthony Villanueva

Computers

9th Grade

Used 5+ times

AP CSP (encryption)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals:

Time

Date

Location of animal

Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?

In what geographic locations does the animal typically travel?

Approximately how many miles did the animal travel in one week?

Does the animal travel in groups with other tracked animals?

Do the movement patterns of the animal vary according to the weather?

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption to encrypt their customers’ credit card information. Is this a secure form of payment?

Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve

Yes, public key encryption is secure because it transmits credit card information in binary

No, public key encryption allows the credit card information to be read by the public

No, the Internet protocols are open standards and thus everything sent over the Internet is sent “in the clear”

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following statements best describes the properties of public key encryption?

Public key encryption makes use of certain types of problems which are easier for humans to solve than computers

Public key encryption makes use of mathematical problems which no algorithm can be used to solve

Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information

Public key encryption is a highly secure encryption scheme that in which a single shared key is used by both the sender and receiver of the message

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Choose the answer that is NOT a feature of public key cryptography:

Allows secure communication without establishing a “shared” encryption key ahead of time

A key for decrypting is never made public

Using public key guarantees that only the intended recipient can decrypt the message

A public key database ensures 3rd party accountability of security

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following are true statements about digital certificates in Web browsers?

I. Digital certificates are used to verify the ownership of encrypted keys used in secured communication

II. Digital certificates are used to verify that the connection to a Website is fault tolerant

I only

II only

both I and II

neither I or II

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

In public key cryptography, the sender uses the recipient’s public key to encrypt a message. Which of the following is needed to decrypt the message?

recipient's public key

recipient's private key

sender's public key

sender's private key

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following is an underlying assumption that is made when Moore’s law is used?

As computer hardware improves, future computers will be able to run faster than current computers.

As computer hardware improves, the number of cybersecurity concerns will increase.

As computer hardware improves, the algorithms used in programs will become more efficient.

As computer hardware improves, developers will become more skilled at writing code.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?