Study Guide Part 7 (Module 5)

Study Guide Part 7 (Module 5)

9th - 12th Grade

5 Qs

quiz-placeholder

Similar activities

CLO Computing: Ethical, Legal & Environmental

CLO Computing: Ethical, Legal & Environmental

9th - 11th Grade

10 Qs

Technical Terms - Internet (A-Z) - IPsec

Technical Terms - Internet (A-Z) - IPsec

12th Grade

10 Qs

Privacy & Security in Cloud Computing Case Study By Mr. B

Privacy & Security in Cloud Computing Case Study By Mr. B

12th Grade

10 Qs

Cybersecurity Chapter 4

Cybersecurity Chapter 4

11th Grade

9 Qs

GenCyber

GenCyber

11th Grade - University

10 Qs

Network Security Risks

Network Security Risks

12th Grade

10 Qs

Encryption

Encryption

9th - 11th Grade

10 Qs

Encryption - AQA A Level Computer Science

Encryption - AQA A Level Computer Science

11th - 12th Grade

10 Qs

Study Guide Part 7 (Module 5)

Study Guide Part 7 (Module 5)

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

KEDRAL TIMMONS

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

An encryption _____ is a set of steps that converts readable text into unreadable text.

series

algorithm

method

key

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

An encryption ______ is a set of characters that the originator of the data used to encrypt, and the recipient of the data uses to decrypt.

password

algorithm

code

key

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which of the following is NOT true about cloud data privacy?

Law enforcement officials cannot access email messages stored on the cloud without informing the user first.

The company storing the data must protect against data loss due to physical disasters.

When transferring data over a network to the cloud, the data should be encrypted and authenticated.

Cloud storage companies have increased.

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

FERPA regulates the confidentiality of ________

criminal records

students' educational records.

financial transactions

user names and passwords

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Which of the following is not recommended to protect against hardware failure?

surge protector

UPS

cables and locks

duplicate components