
Cybersecurity Chapter 4
Authored by E Sheng Toh
Computers
11th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the mac type of access control is implemented?
detective
preventive
masking
deterrent
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
one-time pad
symmetric
asymmetric
hash
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?
Caesar
AES
3DES
Vignere
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used to describe the science of making and breaking secret codes?
spoofing
impersonation
cryptology
jamming
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?
block
transform
hash
symmetric
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
transposition
one-time pad
asymmetric
symmetric
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term describes the technology that protects software from unauthorized access or modification?
copyright
trademark
access control
watermarking
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?