
Security
Quiz
•
Computers
•
1st - 3rd Grade
•
Practice Problem
•
Medium
Susilawati Rahim
Used 3+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
What is meant by the term cipher when used in cryptography?
an encryption or decryption algorithm
an encrypted message
a type of session key
a digital signature
text following an encryption algorithm
2.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
When carrying out asymmetric encryption, which of the following users would keep the
private key?
the sender
the receiver
both sender and receiver
all recipients of the message
none of the above
3.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
In cryptography, which of the following is the term used to describe the message before it
is encrypted?
simpletext
plaintext
notext
ciphertext
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following is the biggest disadvantage of using symmetric encryption?
it is very complex and time consuming
it is rarely used any more
the value of the key reads the same in both directions
it only works on computers with older operating systems
there is a security problem when transmitting the secret key
5.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Which of the following is the correct name for a form of encryption in which both the
sender and the recipient use the same key to encrypt/decrypt?
symmetric key encryption
asymmetric key encryption
public key encryption
same key encryption
block cipher encryption
6.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Which of the following is involved in temporary key generation?
session keys
private key and certificate
public key and certificate
master keys
public keys
7.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Which of the following is a correct statement about PKIs?
they use private and public keys but not digital certificates
they use digital signatures and public keys
they are a combination of digital certificates, public key cryptography and CAs
they use asymmetric keys, hashing algorithms and certificate authorities
they are a combination of digests, hashing algorithms and asymmetric cryptographic
algorithms
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
Class-2 Ch-3
Quiz
•
2nd Grade
8 questions
SCR1 Recap Day 3
Quiz
•
1st Grade
8 questions
WordPad 3 Grade 2
Quiz
•
2nd Grade
10 questions
Jr 1 - Unit 3 : Working with Text
Quiz
•
1st Grade
10 questions
Types of Keyboards and Keys
Quiz
•
1st - 4th Grade
10 questions
quiz computer
Quiz
•
1st Grade
10 questions
Problem Solving 2
Quiz
•
1st Grade
10 questions
Youtubers Charlie.C-J
Quiz
•
3rd - 9th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
