Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

quiz-placeholder

Similar activities

Word Processor

Word Processor

4th Grade

13 Qs

TIK KELAS 6 BAB 5

TIK KELAS 6 BAB 5

6th Grade

10 Qs

Internet

Internet

University

11 Qs

Databases

Databases

11th Grade

15 Qs

Y3 - Computer Systems and Networks - Connecting Computers

Y3 - Computer Systems and Networks - Connecting Computers

2nd Grade

12 Qs

ICF-Mechanical-(Theory Quiz-2)

ICF-Mechanical-(Theory Quiz-2)

University

10 Qs

7ICT - Algorithms Revision Quiz

7ICT - Algorithms Revision Quiz

7th Grade

15 Qs

lanjutan bab 1

lanjutan bab 1

KG

10 Qs

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

Assessment

Quiz

Computers

KG - University

Medium

Created by

Marcus Phang

Used 70+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three protocols use asymmetric key algorithms? (Choose three.)

Secure Shell (SSH)

Pretty Good Privacy (PGP)

Secure Sockets Layer (SSL)

Advanced Encryption Standard (AES)

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

WEP

DES

RSA

Diffie-Hellman (DH)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

symmetric

asymmetric

transposition

one-time pad

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three devices represent examples of physical access controls? (Choose three.)

locks

firewalls

swipe cards

video cameras

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

hash

symmetric

asymmetric

one-time pad

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

detective

deterrent

masking

preventive

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?