Search Header Logo

Encryption and Public Keys (How the internet works)

Authored by Sabrina Huston

Computers

6th - 8th Grade

Used 239+ times

Encryption and Public Keys (How the internet works)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Scrambling or changing a message to hide it is called

Secure Communication

Symmetric Encryption

Encryption

Public Keys

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unscrambling a message to make it readable is called...

SSL

Security Protocols

Decryption

Encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Today's secure communications are encrypted using ______ bit keys.

156

10

356

256

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When the sender and receiver use the same key to encrypt and decrypt

Symmetric Encryption

Asymmetric Encryption

Public Keys

Private Keys

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When different keys are used for encrypting and decrypting

Symmetric Encryption

Asymmetric Encryption

Public Key

Private Key

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When the encryption key is shared with everyone so anyone can encrypt a message

Symmetric Encryption

Asymmetric Encryption

Public Key

Private Key

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When the message can only be decrypted by a computer with an access key

Symmetric Encryption

Asymmetric Encryption

Private Key

Public Key

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?