
Encryption and Public Keys (How the internet works)
Authored by Sabrina Huston
Computers
6th - 8th Grade
Used 239+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Scrambling or changing a message to hide it is called
Secure Communication
Symmetric Encryption
Encryption
Public Keys
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Unscrambling a message to make it readable is called...
SSL
Security Protocols
Decryption
Encryption
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Today's secure communications are encrypted using ______ bit keys.
156
10
356
256
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When the sender and receiver use the same key to encrypt and decrypt
Symmetric Encryption
Asymmetric Encryption
Public Keys
Private Keys
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When different keys are used for encrypting and decrypting
Symmetric Encryption
Asymmetric Encryption
Public Key
Private Key
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When the encryption key is shared with everyone so anyone can encrypt a message
Symmetric Encryption
Asymmetric Encryption
Public Key
Private Key
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When the message can only be decrypted by a computer with an access key
Symmetric Encryption
Asymmetric Encryption
Private Key
Public Key
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?