
CIW IBA Lesson 8 Vocabulary
Authored by Zac Lewis
Computers
8th Grade - Professional Development
Used 16+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software that scans disks and programs for known viruses and eliminates them.
anti-virus software
asymmetric encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An encryption method in which two keys are used to encrypt and decrypt a message.
asymmetric encryption
symmetric encryption
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.
authentication
digital certificate
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The process of converting encrypted data back to its original form.
decryption
encryption
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A password-protected, encrypted data file containing message encryption, user identification and message text.
digital certificate
asymmetric encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time
digital signature
digital certificate
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
encryption
firewall
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?