Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

quiz-placeholder

Similar activities

IAS CH3 QUIZ

IAS CH3 QUIZ

University

25 Qs

Network Security

Network Security

11th Grade

20 Qs

Computer Security 1

Computer Security 1

University

30 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

Module 6

Module 6

12th Grade

21 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

Network Defence

Network Defence

University

20 Qs

Encryption and 2D Arrays

Encryption and 2D Arrays

9th - 12th Grade

20 Qs

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

Assessment

Quiz

Computers

9th Grade - University

Medium

Created by

Paul Zettler

Used 36+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher that replaces plaintext letters with other letters to make the cipher.

substitution

transposition

obfuscation

masking

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher that rearranges plaintext letters to create the cipher.

substitution

transposition

obfuscation

masking

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher encrypts plaintext one bit at a time.

substitution

transposition

stream

block

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher takes a fixed length of plaintext and encrypts in into cypher text in one chunk.

substitution

transposition

stream

block

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a encryption algorithm uses the same key for encryption and decryption.

substitution

transposition

symmetric

asymmetric

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a encryption algorithm uses the one key for encryption and another for decryption.

substitution

transposition

symmetric

asymmetric

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is asymmetric algorithm provides an electronic key exchange method to share the secret key.

Diffie-Hellman

ECC (Elliptic Curve Cryptography)

AES (Advance Encryption Standard)

WEP (Wired Equivalent Privacy)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?