Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

quiz-placeholder

Similar activities

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

Interactive Media

Interactive Media

10th Grade

20 Qs

The Internet

The Internet

University

20 Qs

Sesion 1 Curso LPIC 2023

Sesion 1 Curso LPIC 2023

University

20 Qs

JavaScript - Practice 10

JavaScript - Practice 10

University

20 Qs

Quiziz UTS

Quiziz UTS

University

20 Qs

City & Guilds Award in Business Processes

City & Guilds Award in Business Processes

12th Grade

20 Qs

Database Basics v2 N5

Database Basics v2 N5

1st - 12th Grade

20 Qs

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

Assessment

Quiz

Computers

9th Grade - University

Medium

Created by

Paul Zettler

Used 36+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher that replaces plaintext letters with other letters to make the cipher.

substitution

transposition

obfuscation

masking

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher that rearranges plaintext letters to create the cipher.

substitution

transposition

obfuscation

masking

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher encrypts plaintext one bit at a time.

substitution

transposition

stream

block

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a type of cipher takes a fixed length of plaintext and encrypts in into cypher text in one chunk.

substitution

transposition

stream

block

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a encryption algorithm uses the same key for encryption and decryption.

substitution

transposition

symmetric

asymmetric

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is a encryption algorithm uses the one key for encryption and another for decryption.

substitution

transposition

symmetric

asymmetric

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is asymmetric algorithm provides an electronic key exchange method to share the secret key.

Diffie-Hellman

ECC (Elliptic Curve Cryptography)

AES (Advance Encryption Standard)

WEP (Wired Equivalent Privacy)

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?