
Chapter 4 Quiz
Authored by Kevin Wong
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term describes the technology that protects software from unauthorized access or modification?
trademark
copyright
watermarking
access control
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Data is likely to be an organisation most valuable assets. True or False?
TRUE
False
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which three protocols use asymmetric key algorithms? (Choose three.)
Secure Shell (SSH)
Advanced Encryption Standard (AES)
Secure Sockets Layer (SSL)
Pretty Good Privacy (PGP)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
radiography
steganography
enciphergraphy
deciphergraphy
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
WEP
DES
RSA
Diffie-Hellman (DH)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
symmetric
asymmetric
transposition
one-time pad
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which three devices represent examples of physical access controls? (Choose three.)
locks
firewalls
swipe cards
video cameras
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?