IS404 - SY2023

IS404 - SY2023

Professional Development

21 Qs

quiz-placeholder

Similar activities

ISC Lib 2023 Day 7

ISC Lib 2023 Day 7

Professional Development

20 Qs

ICT

ICT

Professional Development

20 Qs

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

SOFTWARE INSTALLATION CAT 1

SOFTWARE INSTALLATION CAT 1

Professional Development

16 Qs

Pop Quiz 1

Pop Quiz 1

Professional Development

16 Qs

Cyber security and Data protection Test

Cyber security and Data protection Test

Professional Development

20 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Professional Development

21 Qs

A+ - 18A - Configure mobile OS security

A+ - 18A - Configure mobile OS security

Professional Development

21 Qs

IS404 - SY2023

IS404 - SY2023

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Paul Lavarez

Used 1+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unsafe IT practice by an employee is an example of what type of security threat?
Internal
External
Physical

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ransomware is an example of what type of security threat?
Internal
External
Physical

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If an employee accidentally deletes data it is an example of what type of security threat?
Internal
External
Physical

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following refers to the process of converting a ciphertext back to its original form?

Algorithm

Cryptology

Decryption

Encryption

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Cryptography originally comes from the Greek words kryptos and graphein. If graphein means "to write", what does kryptos mean?

changed

coded

hidden

transmitted

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following refers to the programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message?

Algorithm

Cryptanalysis

Encryption

Decryption

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

(True or False) The algorithm doesn't need to be kept secret, but the key does.

True

False

None of the above

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?