Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

quiz-placeholder

Similar activities

Caesar Cipher and Enigma Machine

Caesar Cipher and Enigma Machine

9th Grade

20 Qs

Cryptography Quiz 1

Cryptography Quiz 1

University

25 Qs

Cryptography

Cryptography

12th Grade

24 Qs

Cryptography

Cryptography

9th - 10th Grade

20 Qs

Cryptography

Cryptography

7th - 9th Grade

20 Qs

AP-CSP Unit 4 Test Review

AP-CSP Unit 4 Test Review

11th - 12th Grade

21 Qs

ASAS SAINS KOMPUTER

ASAS SAINS KOMPUTER

12th Grade

25 Qs

LATIHAN ASK T3 B2

LATIHAN ASK T3 B2

9th Grade

20 Qs

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

Assessment

Quiz

Computers

9th Grade - University

Medium

Created by

Paul Zettler

Used 36+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher that replaces plaintext letters with other letters to make the cipher.

substitution

transposition

obfuscation

masking

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher that rearranges plaintext letters to create the cipher.

substitution

transposition

obfuscation

masking

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher encrypts plaintext one bit at a time.

substitution

transposition

stream

block

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher takes a fixed length of plaintext and encrypts in into cypher text in one chunk.

substitution

transposition

stream

block

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a encryption algorithm uses the same key for encryption and decryption.

substitution

transposition

symmetric

asymmetric

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a encryption algorithm uses the one key for encryption and another for decryption.

substitution

transposition

symmetric

asymmetric

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is asymmetric algorithm provides an electronic key exchange method to share the secret key.

Diffie-Hellman

ECC (Elliptic Curve Cryptography)

AES (Advance Encryption Standard)

WEP (Wired Equivalent Privacy)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?