
Cybersecurity Fundamentals Week 4 Quiz
Authored by Marcus Phang
Computers
KG - University
Used 70+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which three protocols use asymmetric key algorithms? (Choose three.)
Secure Shell (SSH)
Pretty Good Privacy (PGP)
Secure Sockets Layer (SSL)
Advanced Encryption Standard (AES)
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
WEP
DES
RSA
Diffie-Hellman (DH)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
symmetric
asymmetric
transposition
one-time pad
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which three devices represent examples of physical access controls? (Choose three.)
locks
firewalls
swipe cards
video cameras
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
hash
symmetric
asymmetric
one-time pad
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?
detective
deterrent
masking
preventive
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?