chapter 4

chapter 4

University

•

25 Qs

quiz-placeholder

Similar activities

Art Criticism and Analysis Worksheet

Art Criticism and Analysis Worksheet

University

•

22 Qs

Multimedia Art I Course Syllabus Quiz

Multimedia Art I Course Syllabus Quiz

11th Grade - University

•

22 Qs

Elements of Music

Elements of Music

University

•

25 Qs

Exploring Music Theory Elements

Exploring Music Theory Elements

8th Grade - University

•

24 Qs

OVERVIEW OF AI & PS

OVERVIEW OF AI & PS

University

•

20 Qs

Creative Web Design Quiz 2

Creative Web Design Quiz 2

University

•

20 Qs

Intro to Music CH 4 Study Guide

Intro to Music CH 4 Study Guide

9th Grade - University

•

20 Qs

Music Theory: Key Signatures and Scales

Music Theory: Key Signatures and Scales

9th Grade - University

•

20 Qs

chapter 4

chapter 4

Assessment

Quiz

•

Arts

•

University

•

Practice Problem

•

Easy

Created by

KEN ROLLOQUE

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

Diffie-Hellman
RSA
WEP
DES
hashing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

asymmetric
symmetric
transposition
one-time pad

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

stream
block
hash
enigma
elliptical

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

ECC
RSA
AES
El-Gamal
IDEA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the science of making and breaking secret codes?

cryptology
factorization
impersonation
spoofing
jamming

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three processes are examples of logical access controls? (Choose three.)

intrusion detection system (IDS) to watch for suspicious network activity
firewalls to monitor traffic
biometrics to validate physical characteristics
guards to monitor security screens
fences to protect the perimeter of a building

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

steganography
obfuscation
hiding
masking

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?