
Revision for Chapter 4

Quiz
•
Computers
•
University
•
Hard
Kevin Wong
Used 1+ times
FREE Resource
27 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Each encryption method uses a specific algorithm, called a cipher, to encrypt and decrypt messages. A cipher is a series of well-defined steps used to encrypt and decrypt messages. There are three methods of creating ciphertext:
Transposition
Substitution
One-time pad
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
1st type of Encryption: _________ algorithms
Answer explanation
Symmetric algorithms - These algorithms use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data. Both the sender and receiver know the pre-shared key before any encrypted communication begins.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
2nd type of Encryption: _________ algorithms
Answer explanation
Asymmetric algorithms - Asymmetrical encryption algorithms use one key to encrypt data and a different key to decrypt data. One key is public and the other is private. In a public-key encryption system, any person can encrypt a message using the public key of the receiver, and the receiver is the only one that can decrypt it using his private key. Parties exchange secure messages without needing a pre-shared key. Asymmetric algorithms are more complex. These algorithms are resource intensive and slower to execute.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(Cryptography)
Symmetrical versus Asymmetrical Encryption over handling more data
Symmetric encryption
Asymmetric encryption
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
List the types of encryption algorithm and provide the encryption standard for each class
Symmetric - Triple Digital Encryption Standard (3DES)
Symmetric - Advanced Encryption Standard (AES)
Symmetric - International Data Encryption Algorithm (IDEA)
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
List the other type of encryption algorithm and
provide the various encryption standard for each class
Asymmetric - Rivest_ Shamir-Adleman (RSA)
Asymmetric - Diffie-Hellman
Asymmetric - EIGamal
Asymmetric - Elliptic Curve Cryptography (ECC)
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A product consultant had recommended to his team an algorithm that
is used in New Technology File System (NTFS).
Identify the algorithm recommended by the product consultant
Create a free account and access millions of resources
Similar Resources on Wayground
30 questions
ICT 161-190

Quiz
•
University
23 questions
TestOut SecurityPro (9.4 - 9.6)

Quiz
•
University
22 questions
11al网络安全

Quiz
•
11th Grade - University
22 questions
Utility Software

Quiz
•
KG - University
30 questions
City and Guilds Award in Mobile and Operating System

Quiz
•
12th Grade - Professi...
23 questions
CASP+:Chapter 9B

Quiz
•
University
23 questions
Cryptography

Quiz
•
University
23 questions
Cyber Security

Quiz
•
University
Popular Resources on Wayground
12 questions
Unit Zero lesson 2 cafeteria

Lesson
•
9th - 12th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
20 questions
Lab Safety and Equipment

Quiz
•
8th Grade
13 questions
25-26 Behavior Expectations Matrix

Quiz
•
9th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
15 questions
Let's Take a Poll...

Quiz
•
9th Grade - University
2 questions
Pronouncing Names Correctly

Quiz
•
University
12 questions
Civil War

Quiz
•
8th Grade - University
18 questions
Parent Functions

Quiz
•
9th Grade - University
21 questions
Mapa países hispanohablantes

Quiz
•
1st Grade - University
19 questions
Primary v. Secondary Sources

Quiz
•
6th Grade - University
25 questions
Identifying Parts of Speech

Quiz
•
8th Grade - University
20 questions
Disney Trivia

Quiz
•
University