Search Header Logo

Cibrscurtiy

Authored by Adrian Taylor

Computers

9th Grade

Used 2+ times

Cibrscurtiy
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What is Symmetric encryption?

It uses the same key to encrypt and decrypt data

Asymmetric encryption

Private Key encryption

It uses a pair of related keys to encrypt and decrypt data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the CIA triad?

Confidentiality, Integrity, and Availability

Cars, in, the air

Chickens, introducing, apples

Clocks, identifying, the alphabet

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Hashing

cooking hashbrowns

the process of transforming any given key or a string of characters into another value and can be changed back

opening a trenchcoat infront of children

the process of transforming any given key or a string of characters into another value and cant be changed back

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many layers of firewall is needed before a devices is considered DMZ

100

2

1

5

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is port 20 and 21

UDP

FTP

PP

CPS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Virus

sisters

moms

A form of malware that spreads to files and spreads its damage through those files.

Covid

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

help ensure systems and their resources are only accessed by authorized personnel and that activity on those systems is tracked.

AAA

Monkeys

Ransomware

Accounting

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?