Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

quiz-placeholder

Similar activities

Lesson 4.1

Lesson 4.1

9th - 12th Grade

20 Qs

Transport Layer Security

Transport Layer Security

University

20 Qs

Cryptography

Cryptography

9th - 12th Grade

20 Qs

1.3 OCR Networks Lesson 8

1.3 OCR Networks Lesson 8

8th - 12th Grade

20 Qs

IAS 101 - Week 11 and 12 - Cryptography

IAS 101 - Week 11 and 12 - Cryptography

University

20 Qs

Cybersecurity: Ch 3 & 4

Cybersecurity: Ch 3 & 4

9th - 12th Grade

25 Qs

IAS CH2 QUIZ

IAS CH2 QUIZ

University

25 Qs

Unit 4 Exam - Encryption - Cyber Security

Unit 4 Exam - Encryption - Cyber Security

9th - 12th Grade

20 Qs

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

Assessment

Quiz

Computers

9th Grade - University

Medium

Created by

Paul Zettler

Used 36+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher that replaces plaintext letters with other letters to make the cipher.

substitution

transposition

obfuscation

masking

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher that rearranges plaintext letters to create the cipher.

substitution

transposition

obfuscation

masking

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher encrypts plaintext one bit at a time.

substitution

transposition

stream

block

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher takes a fixed length of plaintext and encrypts in into cypher text in one chunk.

substitution

transposition

stream

block

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a encryption algorithm uses the same key for encryption and decryption.

substitution

transposition

symmetric

asymmetric

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a encryption algorithm uses the one key for encryption and another for decryption.

substitution

transposition

symmetric

asymmetric

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is asymmetric algorithm provides an electronic key exchange method to share the secret key.

Diffie-Hellman

ECC (Elliptic Curve Cryptography)

AES (Advance Encryption Standard)

WEP (Wired Equivalent Privacy)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?