chapter 4

chapter 4

University

•

25 Qs

quiz-placeholder

Similar activities

Y9: Music Theory Exam Revision

Y9: Music Theory Exam Revision

8th Grade - University

•

20 Qs

Crafty Crafts #3 MATERIAL

Crafty Crafts #3 MATERIAL

KG - Professional Development

•

21 Qs

Can U Name All this Nickelodeon shows?

Can U Name All this Nickelodeon shows?

KG - University

•

20 Qs

Name That Tool!

Name That Tool!

8th Grade - University

•

25 Qs

Organizational Behavior TEST 1

Organizational Behavior TEST 1

University

•

20 Qs

SEC - Octo 2025

SEC - Octo 2025

1st Grade - University

•

20 Qs

Pump Operation and Maintenance Quiz

Pump Operation and Maintenance Quiz

12th Grade - University

•

20 Qs

SEC - Leadership Qualities - II CIA

SEC - Leadership Qualities - II CIA

2nd Grade - University

•

20 Qs

chapter 4

chapter 4

Assessment

Quiz

•

Arts

•

University

•

Practice Problem

•

Easy

Created by

KEN ROLLOQUE

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

Diffie-Hellman
RSA
WEP
DES
hashing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

asymmetric
symmetric
transposition
one-time pad

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

stream
block
hash
enigma
elliptical

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

ECC
RSA
AES
El-Gamal
IDEA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the science of making and breaking secret codes?

cryptology
factorization
impersonation
spoofing
jamming

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three processes are examples of logical access controls? (Choose three.)

intrusion detection system (IDS) to watch for suspicious network activity
firewalls to monitor traffic
biometrics to validate physical characteristics
guards to monitor security screens
fences to protect the perimeter of a building

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

steganography
obfuscation
hiding
masking

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?