Lesson 4.1

Lesson 4.1

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Simple Encryption

Simple Encryption

10th Grade

15 Qs

Data Protection part 2

Data Protection part 2

12th Grade

15 Qs

Cryptography AP CSP

Cryptography AP CSP

9th - 12th Grade

15 Qs

Computer Pioneers - Charles Babbage & others

Computer Pioneers - Charles Babbage & others

9th Grade

20 Qs

Module 6

Module 6

12th Grade

21 Qs

Cryptography

Cryptography

8th - 10th Grade

20 Qs

Caesar Cipher

Caesar Cipher

9th Grade

25 Qs

C A+ U11

C A+ U11

9th Grade

17 Qs

Lesson 4.1

Lesson 4.1

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Andrew Griffin

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fits the definition?

An algorithm used for encryption or decryption.

Cipher

Cryptography

Plaintext

Ciphertext

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fits the definition?

The science and art of delivering a message securely and confidentially.

Cipher

Cryptography

Plaintext

Ciphertext

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fits the definition?

The original message that needs to be encrypted.

Cipher

Cryptography

Plaintext

Ciphertext

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fits the definition?

The encrypted message generated by a cipher.

Cipher

Cryptography

Plaintext

Ciphertext

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are examples of cryptographic devices?

Homophone Substitution

Literary Code

Playfair Cipher

Letter Frequency

Cryptography

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fits the definition?

An encryption method where the sender and receiver share a single private key to use in the encryption algorithm.

Symmetric Key Encryption

Cryptography

Cipher

Asymmetric Key Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fits the definition?

An encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner. The keys are combined mathematically to create one key used in the encryption/decryption algorithm.

Symmetric Key Encryption

Cryptography

Cipher

Asymmetric Key Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?