Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

quiz-placeholder

Similar activities

Public Key Encryption

Public Key Encryption

12th Grade

10 Qs

A level CIE Security

A level CIE Security

10th - 12th Grade

12 Qs

APCSP 2.1.1 - 2.1.3 Review

APCSP 2.1.1 - 2.1.3 Review

9th - 12th Grade

15 Qs

1.3.1. Compression, Encryption and Hashing

1.3.1. Compression, Encryption and Hashing

12th Grade

13 Qs

Encryption and Data Security Quiz

Encryption and Data Security Quiz

6th - 8th Grade

9 Qs

Encryption and Public Keys (How the internet works)

Encryption and Public Keys (How the internet works)

6th - 8th Grade

8 Qs

Encryption

Encryption

Professional Development

15 Qs

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

Assessment

Quiz

Computers

KG - University

Medium

Created by

Marcus Phang

Used 70+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three protocols use asymmetric key algorithms? (Choose three.)

Secure Shell (SSH)

Pretty Good Privacy (PGP)

Secure Sockets Layer (SSL)

Advanced Encryption Standard (AES)

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

WEP

DES

RSA

Diffie-Hellman (DH)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

symmetric

asymmetric

transposition

one-time pad

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three devices represent examples of physical access controls? (Choose three.)

locks

firewalls

swipe cards

video cameras

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

hash

symmetric

asymmetric

one-time pad

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

detective

deterrent

masking

preventive

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?