IS404 - SY2023

IS404 - SY2023

Professional Development

21 Qs

quiz-placeholder

Similar activities

FS_Prelim Quiz

FS_Prelim Quiz

Professional Development

20 Qs

MS OUTLOOK QUIZ - JIT

MS OUTLOOK QUIZ - JIT

Professional Development

20 Qs

101-120

101-120

Professional Development

20 Qs

Introdução a Projetos

Introdução a Projetos

Professional Development

18 Qs

Atalhos

Atalhos

Professional Development

20 Qs

6INFOMAN (Recitation)

6INFOMAN (Recitation)

University - Professional Development

20 Qs

C programming_Shivank

C programming_Shivank

Professional Development

20 Qs

Day 1 - Wrap up (Workforce Excel)

Day 1 - Wrap up (Workforce Excel)

Professional Development

20 Qs

IS404 - SY2023

IS404 - SY2023

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Paul Lavarez

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unsafe IT practice by an employee is an example of what type of security threat?
Internal
External
Physical

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ransomware is an example of what type of security threat?
Internal
External
Physical

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If an employee accidentally deletes data it is an example of what type of security threat?
Internal
External
Physical

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following refers to the process of converting a ciphertext back to its original form?

Algorithm

Cryptology

Decryption

Encryption

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Cryptography originally comes from the Greek words kryptos and graphein. If graphein means "to write", what does kryptos mean?

changed

coded

hidden

transmitted

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following refers to the programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message?

Algorithm

Cryptanalysis

Encryption

Decryption

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

(True or False) The algorithm doesn't need to be kept secret, but the key does.

True

False

None of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?