chapter 4

chapter 4

University

25 Qs

quiz-placeholder

Similar activities

Test 1

Test 1

University

22 Qs

Music theory quiz (medium!)

Music theory quiz (medium!)

9th Grade - University

20 Qs

Handmade Workshop

Handmade Workshop

University

20 Qs

Identifying key signatures, notes, and solfège

Identifying key signatures, notes, and solfège

9th Grade - Professional Development

30 Qs

Key Signatures

Key Signatures

4th Grade - University

30 Qs

Key Signatures

Key Signatures

5th Grade - University

28 Qs

UI/UX Design Midterm Exam

UI/UX Design Midterm Exam

University

20 Qs

Tech Theory Jazz

Tech Theory Jazz

10th Grade - University

20 Qs

chapter 4

chapter 4

Assessment

Quiz

Arts

University

Easy

Created by

KEN ROLLOQUE

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
Diffie-Hellman
RSA
WEP
DES
hashing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
asymmetric
symmetric
transposition
one-time pad

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?
stream
block
hash
enigma
elliptical

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?
ECC
RSA
AES
El-Gamal
IDEA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the science of making and breaking secret codes?
cryptology
factorization
impersonation
spoofing
jamming

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three processes are examples of logical access controls? (Choose three.)
intrusion detection system (IDS) to watch for suspicious network activity
firewalls to monitor traffic
biometrics to validate physical characteristics
guards to monitor security screens
fences to protect the perimeter of a building

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
steganography
obfuscation
hiding
masking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Arts