
Chapter 4
Authored by sam foon
Other
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which three protocols use asymmetric key algorithms? (Choose three.)
Secure Shell (SSH)
Pretty Good Privacy (PGP)
Secure Sockets Layer (SSL)
Advanced Encryption Standard (AES)
Answer explanation
Refer to Chapter 4 - Slides 9 - Symmetrical versus Asymmetrical Encryption
Four protocols use asymmetric key algorithms:
1) Internet Key Exchange (IKE), which is a fundamental component of IPsec Virtual Private Networks (VPNs).
2) Secure Socket Layer (SSL), which is a means of implementing cryptography into a web browser.
3) Secure Shell (SSH), which is a protocol that provides a secure remote access connection to network devices.
4) Pretty Good Privacy (PGP), which is a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
steganography
cryptography
data masking
Answer explanation
Refer to Chapter 4 - Slides 24 - Steganography
Steganography conceals data (the message) in another file such as a graphic, audio, or other text file. The advantage of steganography over cryptography is that the secret message does not attract any special attention. No one would ever know that a picture actually contained a secret message by viewing the file either electronically or in hardcopy.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
WEP
DES
RSA
Diffie-Hellman (DH)
Answer explanation
Refer to Chapter 4 - Slides 7 - Public-Key Encryption
Diffie-Hellman - provides an electronic exchange method to share the secret key. Secure protocols, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS), Secure Shell (SSH), and Internet Protocol Security (IPsec), use Diffie-Hellman.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
symmetric
asymmetric
transposition
one-time pad
Answer explanation
Refer to Chapter 4 - Slides 5 - Overview
Asymmetric algorithms - Asymmetrical encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private. In a public-key encryption system, any person can encrypt a message using the public key of the receiver, and the receiver is the only one that can decrypt it using his private key. Parties exchange secure messages without needing a pre-shared key. Asymmetric algorithms are more complex. These algorithms are resource intensive and slower to execute.
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Which three devices represent examples of physical access controls? (Choose three.)
locks
firewalls
swipe cards
video cameras
Answer explanation
Refer to Chapter 4 - Slides 13 - Types of Access Control
Examples of physical access controls include the following:
- Guards monitor the facility
- Fences protect the perimeter
- Motion detectors detect moving objects
- Laptop locks safeguard portable equipment
- Locked doors prevent unauthorized access
- Swipe cards allow access to restricted areas
- Guard dogs protect the facility
- Video cameras monitor a facility by collecting and recording images
- Mantraps allow access to the secured area after door 1 closes
- Alarms detect intrusion
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
hash
symmetric
asymmetric
one-time pad
Answer explanation
Refer to Chapter 4 - Slides 5 - Overview
Symmetric algorithms - These algorithms use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?
detective
deterrent
masking
preventive
Answer explanation
Refer to Chapter 4 - Slides 19 - Types of Security Controls
Deterrent Controls - A deterrent is the opposite of a reward. A reward encourages individuals to do the right thing, while a deterrent discourages them from doing the wrong thing. Cybersecurity professionals and organizations use deterrents to limit or mitigate an action or behavior. Deterrents do not always stop these actions.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
14 questions
Qualitative research
Quiz
•
Professional Development
10 questions
INSET DAY 16 RECAP QUIZ
Quiz
•
Professional Development
12 questions
AWS Architect Test 2
Quiz
•
Professional Development
10 questions
TDX21 Quiz
Quiz
•
Professional Development
15 questions
Quiz SIMPRO 2.0 PK-OP
Quiz
•
Professional Development
15 questions
hroXchange Series Talk 2
Quiz
•
Professional Development
15 questions
Risk Analysis
Quiz
•
Professional Development
10 questions
Minecraft
Quiz
•
KG - Professional Dev...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Other
10 questions
How to Email your Teacher
Quiz
•
Professional Development
6 questions
3RD GRADE DECLARATION OF INDEPENDENCE EXIT TICKET
Quiz
•
Professional Development
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
22 questions
Multiplying Exponents with the Same Base
Quiz
•
9th Grade - Professio...
40 questions
Flags of the World
Quiz
•
KG - Professional Dev...