Cybersecurity Chapter 4

Cybersecurity Chapter 4

11th Grade

9 Qs

quiz-placeholder

Similar activities

Activity 2.1.2 Encyrption: Keep it Confidential

Activity 2.1.2 Encyrption: Keep it Confidential

9th - 12th Grade

11 Qs

Vocabulary Review Unit 4

Vocabulary Review Unit 4

9th - 12th Grade

12 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

Unit 4 Big Data

Unit 4 Big Data

10th - 12th Grade

11 Qs

Hashing, Digital Signatures and BlockChain Practice Questions

Hashing, Digital Signatures and BlockChain Practice Questions

11th Grade

10 Qs

10.4 Data Encryption

10.4 Data Encryption

9th - 12th Grade

7 Qs

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

Encryption

Encryption

9th - 11th Grade

10 Qs

Cybersecurity Chapter 4

Cybersecurity Chapter 4

Assessment

Quiz

Computers

11th Grade

Hard

Created by

E Sheng Toh

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the mac type of access control is implemented?

detective

preventive

masking

deterrent

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

one-time pad

symmetric

asymmetric

hash

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

Caesar

AES

3DES

Vignere

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the science of making and breaking secret codes?

spoofing

impersonation

cryptology

jamming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?

block

transform

hash

symmetric

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

transposition

one-time pad

asymmetric

symmetric

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the technology that protects software from unauthorized access or modification?

copyright

trademark

access control

watermarking

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

stream

block

enigma

hash

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

Diffie-Hellman

RSA

WEP

DES