C1 Cryptography & Encryption

C1 Cryptography & Encryption

11th Grade

10 Qs

quiz-placeholder

Similar activities

3.2.2 Utility Software Edexcel

3.2.2 Utility Software Edexcel

9th - 11th Grade

9 Qs

Computer Networks

Computer Networks

11th Grade

15 Qs

Practical Research 1

Practical Research 1

11th Grade

15 Qs

Quiz: Motherboard

Quiz: Motherboard

3rd Grade - University

10 Qs

Computer class review

Computer class review

7th - 12th Grade

13 Qs

BTEC DIT C3 LAB - Device Hardening & Encryption

BTEC DIT C3 LAB - Device Hardening & Encryption

10th - 11th Grade

10 Qs

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

C1 Cryptography & Encryption

C1 Cryptography & Encryption

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Melody Kelley

Used 32+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This terms is derived from the Greek work kryptos, meaning hidden or secret.

Chronological

Cryogenics

Encryption

Steganography

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This person develops strong solutions to provide data security.

Cartographer

Computer forensic analyst

Cryptanalyst

Cryptographer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name for when both peers agree that the other is who they claim to be.

Multifactor authentication

Mutual authentication

Twofish authentication

Access authorization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


When physics is used instead of mathematics in a cipher process, it is called what?

Biometric cryptology

Physical cryptology

Quantum cryptology

Physical encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of cipher mixes a number of ciphertext alphabets in the cryptogram so each plain letter text is continuously changed.

Monoalphabetic substitution cipher

Polyalphabetic substitution cipher

Rotating substitution cipher

Bilateral substitution cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of encryption uses a single, pre-shared key to encrypt and decrypt data.

Asymmetric encryption

Symmetric encryption

Quantum encryption

Elliptical-curve encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The combination of symmetric and asymmetric encryption that is used to keep Internet banking and e-commerce transactions secure is called this.

Quantum encryption

Elliptical-curve encryption

Hybrid encryption

Twofish encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?