Chapter 4 Quiz

Chapter 4 Quiz

University

12 Qs

quiz-placeholder

Similar activities

LESSON 6 CRYPTOGRAPHY

LESSON 6 CRYPTOGRAPHY

University

14 Qs

Encryption and Cryptography

Encryption and Cryptography

University

10 Qs

Chapter 6

Chapter 6

University

12 Qs

Studio - U3 - LO1 - 1.3 Importance of Cyber Security

Studio - U3 - LO1 - 1.3 Importance of Cyber Security

9th Grade - University

10 Qs

Cybersecurity Fundamentals Week 5 Quiz

Cybersecurity Fundamentals Week 5 Quiz

KG - University

10 Qs

ITS63604_OS_Processes

ITS63604_OS_Processes

University

10 Qs

CNS quiz Part B model-4

CNS quiz Part B model-4

University

15 Qs

CLI Topic 5 - Basic Security

CLI Topic 5 - Basic Security

University

10 Qs

Chapter 4 Quiz

Chapter 4 Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Kevin Wong

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the technology that protects software from unauthorized access or modification?

trademark

copyright

watermarking

access control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data is likely to be an organisation most valuable assets. True or False?

TRUE

False

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three protocols use asymmetric key algorithms? (Choose three.)

Secure Shell (SSH)

Advanced Encryption Standard (AES)

Secure Sockets Layer (SSL)

Pretty Good Privacy (PGP)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

radiography

steganography

enciphergraphy

deciphergraphy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

WEP

DES

RSA

Diffie-Hellman (DH)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

symmetric

asymmetric

transposition

one-time pad

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three devices represent examples of physical access controls? (Choose three.)

locks

firewalls

swipe cards

video cameras

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?