Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

quiz-placeholder

Similar activities

Big Data & Cyber

Big Data & Cyber

9th - 12th Grade

15 Qs

encryptions and dos

encryptions and dos

9th - 11th Grade

9 Qs

Cryptography

Cryptography

10th Grade

15 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

CryptoQuiz

CryptoQuiz

University

15 Qs

CEH Study Guide - 13 Cryptography

CEH Study Guide - 13 Cryptography

Professional Development

15 Qs

SECURITY BASICS AND IT PROFESSIONAL (SECURITY POLICIES)

SECURITY BASICS AND IT PROFESSIONAL (SECURITY POLICIES)

9th - 12th Grade

12 Qs

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

12th Grade - University

15 Qs

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

Assessment

Quiz

Computers

KG - University

Medium

Created by

Marcus Phang

Used 70+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three protocols use asymmetric key algorithms? (Choose three.)

Secure Shell (SSH)

Pretty Good Privacy (PGP)

Secure Sockets Layer (SSL)

Advanced Encryption Standard (AES)

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

WEP

DES

RSA

Diffie-Hellman (DH)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

symmetric

asymmetric

transposition

one-time pad

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three devices represent examples of physical access controls? (Choose three.)

locks

firewalls

swipe cards

video cameras

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

hash

symmetric

asymmetric

one-time pad

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

detective

deterrent

masking

preventive

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?