CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

8th Grade - Professional Development

21 Qs

quiz-placeholder

Similar activities

AP CSP Unit 4 Ch 1 Vocab

AP CSP Unit 4 Ch 1 Vocab

9th - 12th Grade

19 Qs

IBA Chapter 8B

IBA Chapter 8B

8th - 12th Grade

16 Qs

AP CSP Unit 2 Ch 2

AP CSP Unit 2 Ch 2

9th - 12th Grade

19 Qs

A level CS Unit 17 Security

A level CS Unit 17 Security

12th Grade

20 Qs

Compression, Encryption and Hashing

Compression, Encryption and Hashing

12th Grade

20 Qs

Cybersecurity Awareness

Cybersecurity Awareness

12th Grade

20 Qs

NETWORK SECURITY

NETWORK SECURITY

University

25 Qs

Itech Quiz

Itech Quiz

11th Grade

18 Qs

CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

Assessment

Quiz

Computers

8th Grade - Professional Development

Medium

Created by

Zac Lewis

Used 15+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that scans disks and programs for known viruses and eliminates them.

anti-virus software

asymmetric encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An encryption method in which two keys are used to encrypt and decrypt a message.

asymmetric encryption

symmetric encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.

authentication

digital certificate

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting encrypted data back to its original form.

decryption

encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password-protected, encrypted data file containing message encryption, user identification and message text.

digital certificate

asymmetric encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time

digital signature

digital certificate

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.

encryption

firewall

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?