Cybersecurity Chapter 4

Cybersecurity Chapter 4

11th Grade

9 Qs

quiz-placeholder

Similar activities

Hashing, Digital Signatures and BlockChain Practice Questions

Hashing, Digital Signatures and BlockChain Practice Questions

11th Grade

10 Qs

2.6 Encryption

2.6 Encryption

9th Grade - University

9 Qs

Cybersecurity Unit

Cybersecurity Unit

11th Grade

12 Qs

Encryption

Encryption

9th - 11th Grade

10 Qs

Vocabulary Review Unit 4

Vocabulary Review Unit 4

9th - 12th Grade

12 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

Unit 4 Big Data

Unit 4 Big Data

10th - 12th Grade

11 Qs

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

13 Qs

Cybersecurity Chapter 4

Cybersecurity Chapter 4

Assessment

Quiz

Computers

11th Grade

Hard

Created by

E Sheng Toh

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the mac type of access control is implemented?

detective

preventive

masking

deterrent

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

one-time pad

symmetric

asymmetric

hash

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

Caesar

AES

3DES

Vignere

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the science of making and breaking secret codes?

spoofing

impersonation

cryptology

jamming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?

block

transform

hash

symmetric

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

transposition

one-time pad

asymmetric

symmetric

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the technology that protects software from unauthorized access or modification?

copyright

trademark

access control

watermarking

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

stream

block

enigma

hash

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

Diffie-Hellman

RSA

WEP

DES