
Security
Quiz
•
Computers
•
1st - 3rd Grade
•
Practice Problem
•
Medium
Susilawati Rahim
Used 3+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
What is meant by the term cipher when used in cryptography?
an encryption or decryption algorithm
an encrypted message
a type of session key
a digital signature
text following an encryption algorithm
2.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
When carrying out asymmetric encryption, which of the following users would keep the
private key?
the sender
the receiver
both sender and receiver
all recipients of the message
none of the above
3.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
In cryptography, which of the following is the term used to describe the message before it
is encrypted?
simpletext
plaintext
notext
ciphertext
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following is the biggest disadvantage of using symmetric encryption?
it is very complex and time consuming
it is rarely used any more
the value of the key reads the same in both directions
it only works on computers with older operating systems
there is a security problem when transmitting the secret key
5.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Which of the following is the correct name for a form of encryption in which both the
sender and the recipient use the same key to encrypt/decrypt?
symmetric key encryption
asymmetric key encryption
public key encryption
same key encryption
block cipher encryption
6.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Which of the following is involved in temporary key generation?
session keys
private key and certificate
public key and certificate
master keys
public keys
7.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Which of the following is a correct statement about PKIs?
they use private and public keys but not digital certificates
they use digital signatures and public keys
they are a combination of digital certificates, public key cryptography and CAs
they use asymmetric keys, hashing algorithms and certificate authorities
they are a combination of digests, hashing algorithms and asymmetric cryptographic
algorithms
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
Recapitulation ICT Quiz
Quiz
•
1st Grade
6 questions
design thinking process
Quiz
•
3rd Grade
10 questions
Computer Revision Quiz
Quiz
•
1st Grade
15 questions
1st Quiz E-commerce Part II
Quiz
•
3rd Grade
10 questions
Website Evaluation
Quiz
•
3rd - 6th Grade
10 questions
Microsoft Teams
Quiz
•
KG - 12th Grade
10 questions
Cyber Security
Quiz
•
1st - 10th Grade
6 questions
SCR1 Recap Day 4
Quiz
•
1st Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
