
AP CSP (encryption)
Authored by Anthony Villanueva
Computers
9th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals:
Time
Date
Location of animal
Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?
In what geographic locations does the animal typically travel?
Approximately how many miles did the animal travel in one week?
Does the animal travel in groups with other tracked animals?
Do the movement patterns of the animal vary according to the weather?
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption to encrypt their customers’ credit card information. Is this a secure form of payment?
Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve
Yes, public key encryption is secure because it transmits credit card information in binary
No, public key encryption allows the credit card information to be read by the public
No, the Internet protocols are open standards and thus everything sent over the Internet is sent “in the clear”
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following statements best describes the properties of public key encryption?
Public key encryption makes use of certain types of problems which are easier for humans to solve than computers
Public key encryption makes use of mathematical problems which no algorithm can be used to solve
Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information
Public key encryption is a highly secure encryption scheme that in which a single shared key is used by both the sender and receiver of the message
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Choose the answer that is NOT a feature of public key cryptography:
Allows secure communication without establishing a “shared” encryption key ahead of time
A key for decrypting is never made public
Using public key guarantees that only the intended recipient can decrypt the message
A public key database ensures 3rd party accountability of security
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following are true statements about digital certificates in Web browsers?
I. Digital certificates are used to verify the ownership of encrypted keys used in secured communication
II. Digital certificates are used to verify that the connection to a Website is fault tolerant
I only
II only
both I and II
neither I or II
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
In public key cryptography, the sender uses the recipient’s public key to encrypt a message. Which of the following is needed to decrypt the message?
recipient's public key
recipient's private key
sender's public key
sender's private key
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following is an underlying assumption that is made when Moore’s law is used?
As computer hardware improves, future computers will be able to run faster than current computers.
As computer hardware improves, the number of cybersecurity concerns will increase.
As computer hardware improves, the algorithms used in programs will become more efficient.
As computer hardware improves, developers will become more skilled at writing code.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?