
Chapter 4: The Art of Protecting Secrets Quiz
Authored by Clint Anthony
Computers
12th Grade
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
RSA
Diffie-Hellman
WEP
DES
hashing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
transposition
symmetric
asymmetric
one-time pad
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of cipher encrypts plaintext one byte or one bit at a time?
block
stream
hash
enigma
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?
ECC
RSA
AES
El-Gamal
IDEA
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used to describe the science of making and breaking secret codes?
factorization
cryptology
impersonation
spoofing
jamming
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which three processes are examples of logical access controls? (Choose three.)
guards to monitor security screens
intrusion detection system (IDS) to watch for suspicious network activity
firewalls to monitor traffic
fences to protect the perimeter of a building
biometrics to validate physical characteristics
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
masking
hiding
obfuscation
steganography
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?