Security

Security

1st - 3rd Grade

10 Qs

quiz-placeholder

Similar activities

Fun with text tool

Fun with text tool

3rd - 5th Grade

12 Qs

G2_MS Word Basic Parts

G2_MS Word Basic Parts

2nd Grade

10 Qs

Be4PSPM 1

Be4PSPM 1

1st - 5th Grade

10 Qs

Azure AI Custom Vision

Azure AI Custom Vision

2nd Grade

10 Qs

Power Point

Power Point

1st - 5th Grade

14 Qs

Catches of IOT

Catches of IOT

1st Grade

15 Qs

Computer

Computer

3rd Grade

10 Qs

Security

Security

Assessment

Quiz

Computers

1st - 3rd Grade

Practice Problem

Medium

Created by

Susilawati Rahim

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What is meant by the term cipher when used in cryptography?

an encryption or decryption algorithm

an encrypted message

a type of session key

a digital signature

text following an encryption algorithm

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

When carrying out asymmetric encryption, which of the following users would keep the

private key?

the sender

the receiver

both sender and receiver

all recipients of the message

none of the above

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

In cryptography, which of the following is the term used to describe the message before it

is encrypted?

simpletext

plaintext

notext

ciphertext

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the biggest disadvantage of using symmetric encryption?

it is very complex and time consuming

it is rarely used any more

the value of the key reads the same in both directions

it only works on computers with older operating systems

there is a security problem when transmitting the secret key

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following is the correct name for a form of encryption in which both the

sender and the recipient use the same key to encrypt/decrypt?

symmetric key encryption

asymmetric key encryption

public key encryption

same key encryption

block cipher encryption

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following is involved in temporary key generation?

session keys

private key and certificate

public key and certificate

master keys

public keys

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following is a correct statement about PKIs?

they use private and public keys but not digital certificates

they use digital signatures and public keys

they are a combination of digital certificates, public key cryptography and CAs

they use asymmetric keys, hashing algorithms and certificate authorities

they are a combination of digests, hashing algorithms and asymmetric cryptographic

algorithms

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?