Surprise Test

Surprise Test

University

40 Qs

quiz-placeholder

Similar activities

Branding

Branding

10th Grade - Professional Development

36 Qs

Psyc-Spiritual

Psyc-Spiritual

University

35 Qs

Unit 12

Unit 12

University

40 Qs

Entrepreneurship Quiz

Entrepreneurship Quiz

University

38 Qs

AWS Cloud Practitioner

AWS Cloud Practitioner

University - Professional Development

41 Qs

National Counselor Examination (NCE) Practice 2 Quiz

National Counselor Examination (NCE) Practice 2 Quiz

University

37 Qs

ITE001_Midterm Exam Part 1

ITE001_Midterm Exam Part 1

University

40 Qs

Human Capital Management

Human Capital Management

University - Professional Development

40 Qs

Surprise Test

Surprise Test

Assessment

Quiz

Professional Development

University

Medium

CCSS
RI.9-10.4, 7.NS.A.2C, RI.11-12.4

+2

Standards-aligned

Created by

Geetha M

Used 4+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Cryptography is

the art of encoding information in a format that

only the intended recipients can decode.

replete with object lessons on the design of secure systems, drawn from real-world situations and system security failures.

used to provide proof of the authenticity of information, in a manner analogous to the use of signatures in conventional transactions.

used to protect the integrity and privacy of information and other resources belonging to individuals and organizations is pervasive in both the physical and the digital world.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is encryption?
When you put data / text into code making it difficult to read or understand.
A secret or disguised way of writing; a code.
A formal language designed to communicate instructions to a machine
What is put in, taken in, or operated on by any process or system.

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

hash

one-time pad

symmetric

asymmetric

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

symmetric

transposition

one-time pad

asymmetric

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Hacking refers to:

Data access without permission

Data updating without permission

Data deletion without permission

Data theft

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What do you mean by a Digital Certificate?


1:verifying to a third party that a message or a document is an unaltered copy of one produced by the signer.

2.the data which has been digitally signed or encrypted by any private key can solely be decrypted by its identical public key

1 is true but not 2

Both 1 and 2 are true

Both 1 and 2 are false

2 is true but not 1

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the RSA public key cryptosystem, which one of the following numbers will always be largest?

e

n

p

q

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Professional Development