Encryption

Encryption

12th Grade

17 Qs

Similar activities

Rail Fence Cipher

Rail Fence Cipher

12th Grade - University

15 Qs

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

13 Qs

Cybersecurity Awareness

Cybersecurity Awareness

12th Grade

20 Qs

Internet Security

Internet Security

12th Grade

20 Qs

014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

Big Data & Cyber

Big Data & Cyber

9th - 12th Grade

15 Qs

CCST - Security Tools - Chapter 20

CCST - Security Tools - Chapter 20

9th - 12th Grade

14 Qs

Data, Knowledge Information Yr 12-2

Data, Knowledge Information Yr 12-2

12th Grade

16 Qs

Encryption

Encryption

Assessment

Quiz

Created by

Eliane Lei

Computers

12th Grade

Hard

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the purpose of encryption?

  • To hide the sender's identity

  • To protect data from unauthorized access

  • To increase internet speed

  • To compress files

2.

FILL IN THE BLANK QUESTION

15 mins • 2 pts

There are two main types of encryption: _____ ___ _____ (use lower case)

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the most widely used asymmetric encryption algorithm?

DES (Data Encryption Standard)

AES (Advanced Encryption Standard)

RSA (Rivest-Shamir-Adleman)

Blowfish

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image
If there’s no lock in the address bar and the web address says HTTP without an S, that means every bit of data you send is private and safe.
True
False

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Today's secure communications are encrypted using ______ bit keys.

156

10

356

256

6.

OPEN ENDED QUESTION

15 mins • 4 pts

Explain some differences between plain text and cipher text.

Evaluate responses using AI:

OFF

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

If you were to use a caeser cipher with a key of 3 shifts to the left, how would you encrypt the word: Cipher?
ZAMEBO
ZOMEBO
ZFMEBO
ZFMEBA

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Consider the process of encoding and decoding a message using the following Caesar cipher encoding scheme in which the plaintext and ciphertext alphabets are offset by four positions, as shown below:

Plaintext: a b c d e f g h i j k l m n o p q r s t u v w x y z

Ciphertext: w x y z a b c d e f g h i j k l m n o p q r s t u v


Which of the following encoded ciphertext strings decodes to an original plaintext message of "secret"?

etsecr

wigvix

kwujwl

oaynap

9.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

  1. What is the main feature of asymmetric encryption?

  1. It uses a pair of keys, one of which is public and the other private, to encrypt and decrypt messages.

  1. It uses a single key to encrypt and decrypt messages.

  1. It can ensure the authenticity of the sender and the confidentiality of the message.

  1. It can protect against unauthorized access to the message.

10.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

  1. What is the main advantage of symmetric encryption?

  1. It can encrypt large amounts of data quickly and efficiently.

  1. It can ensure the authenticity of the sender and the confidentiality of the message.

  1. It can be used for both encryption and decryption using the same key.

  1. It can provide better security than asymmetric encryption.

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?