Lesson 4.1

Lesson 4.1

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Data Representation Quiz

Data Representation Quiz

9th Grade

20 Qs

exel 8

exel 8

12th Grade

15 Qs

Year 8 IT - Network Communication

Year 8 IT - Network Communication

7th - 9th Grade

20 Qs

Programming Vocabulary

Programming Vocabulary

10th - 12th Grade

17 Qs

Y10M2A2 - Selection

Y10M2A2 - Selection

6th - 10th Grade

15 Qs

Technology in medicine

Technology in medicine

10th Grade

15 Qs

A level Y12 Data Representation - Numbers SETS

A level Y12 Data Representation - Numbers SETS

11th Grade - University

18 Qs

Emtech Quiz 4

Emtech Quiz 4

11th Grade

15 Qs

Lesson 4.1

Lesson 4.1

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Andrew Griffin

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fits the definition?

An algorithm used for encryption or decryption.

Cipher

Cryptography

Plaintext

Ciphertext

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fits the definition?

The science and art of delivering a message securely and confidentially.

Cipher

Cryptography

Plaintext

Ciphertext

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fits the definition?

The original message that needs to be encrypted.

Cipher

Cryptography

Plaintext

Ciphertext

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fits the definition?

The encrypted message generated by a cipher.

Cipher

Cryptography

Plaintext

Ciphertext

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are examples of cryptographic devices?

Homophone Substitution

Literary Code

Playfair Cipher

Letter Frequency

Cryptography

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fits the definition?

An encryption method where the sender and receiver share a single private key to use in the encryption algorithm.

Symmetric Key Encryption

Cryptography

Cipher

Asymmetric Key Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fits the definition?

An encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner. The keys are combined mathematically to create one key used in the encryption/decryption algorithm.

Symmetric Key Encryption

Cryptography

Cipher

Asymmetric Key Encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?