Midterm Exam Practice Quiz (February Online Day)

Midterm Exam Practice Quiz (February Online Day)

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

EC12-03 Data Collection, Storage, and Manipulation

EC12-03 Data Collection, Storage, and Manipulation

12th Grade

25 Qs

AP Computer Science Principles Security

AP Computer Science Principles Security

9th - 12th Grade

33 Qs

CH 2 COMPUTER 10  Input and Output Devices

CH 2 COMPUTER 10 Input and Output Devices

10th Grade

25 Qs

BTEC IT L3 U1 LA-D Methods of  Protecting Data

BTEC IT L3 U1 LA-D Methods of Protecting Data

12th Grade

29 Qs

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

Network Security - Modules 18-19

Network Security - Modules 18-19

12th Grade

26 Qs

5th ZLGA AP CSP

5th ZLGA AP CSP

9th Grade

35 Qs

BOW - Elimination

BOW - Elimination

12th Grade

26 Qs

Midterm Exam Practice Quiz (February Online Day)

Midterm Exam Practice Quiz (February Online Day)

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Ben Fisher

Used 11+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A mathematical operation that returns the remainder after integer division.

Division

Modulo

Bentle

Math

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Choose the answer that is NOT a feature of Public Key Cryptography:
A key for decrypting is never made public 
Using public key guarantees that only the intended recipient can decrypt the message
A Public Key database ensures 3rd party accountability of security 
Allows secure communication without establishing a *shared* encryption key ahead of time. 

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Fill in the blank of the following statement: "______ encryption is a method of encryption involving one key for both encryption and decryption."
Symmetric
Asymmetric 
Public key 
SSL 

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption to encrypt their customers' credit card information. Is this a secure form of payment?
No, public key encryption allows the credit card information to be read by the public. 
No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear". 
Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve. 
Yes, public key encryption is secure because it transmits credit card information in binary. 

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements best describes the properties of public key encryption?
Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information. 
 Public key encryption is a highly secure encryption scheme that in which a single shared key is used by both the sender and receiver of the message. 
Public key encryption makes use of certain types of problems which are easier for humans to solve than computers. 
Public key encryption makes use of mathematical problems which no algorithm can be used to solve. 

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt
asymmetric encryption
modulo
Private Key
Public Key Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private
asymmetric encryption
modulo
Private Key
Public Key Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?