Encryption

Encryption

9th Grade

5 Qs

quiz-placeholder

Similar activities

ITN 101 1B Quiz Review - SOHO Routers

ITN 101 1B Quiz Review - SOHO Routers

9th - 12th Grade

10 Qs

Quiz Jaringan Nirkabel

Quiz Jaringan Nirkabel

4th Grade - University

10 Qs

Year 8 Keep it safe 2

Year 8 Keep it safe 2

6th - 10th Grade

10 Qs

Error Detection Methods of Data Tranmission

Error Detection Methods of Data Tranmission

9th - 12th Grade

10 Qs

Data Encryption

Data Encryption

9th Grade

7 Qs

Testout IT Fundamentals

Testout IT Fundamentals

8th - 9th Grade

8 Qs

Blockchain

Blockchain

5th Grade - Professional Development

10 Qs

Exploring the Internet of Things

Exploring the Internet of Things

9th Grade - University

10 Qs

Encryption

Encryption

Assessment

Quiz

Computers

9th Grade

Hard

Created by

SARA MASHAL

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption method shifts each letter to the left by a set number of places known as the key

Symmetric Key Encryption

Public Key Encryption

Ceaser Cipher Encryption

Wi-Fi Protected Access (WPA)

Wireless Encryption Protocol(WEP)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wireless encryption method that uses the same encryption key for all the devices on the network

Ceaser Cipher Encryption

Wi-Fi Protected Access (WPA)

Symmetric Key Encryption

Wireless Encryption Protocol(WEP)

Public Key Encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wireless encryption method that generates a new key for each device on the wireless network

Wi-Fi Protected Access (WPA)

Symmetric Key Encryption

Wireless Encryption Protocol(WEP)

Public Key Encryption

Ceaser Cipher Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption method uses the same key to encrypt and decrypt the data

Public Key Encryption

Wireless Encryption Protocol(WEP)

Ceaser Cipher Encryption

Wi-Fi Protected Access (WPA)

Symmetric Key Encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption method uses two keys one to encrypt the data and a different key is used to decrypt it

Wi-Fi Protected Access (WPA)

Ceaser Cipher Encryption

Public Key Encryption

Wireless Encryption Protocol(WEP)

Symmetric Key Encryption