A level CS Unit 17 Security

A level CS Unit 17 Security

12th Grade

19 Qs

quiz-placeholder

Similar activities

014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

Key Exchange - CompTIA Security+ SY0-701 - 1.4

Key Exchange - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

12th Grade - University

15 Qs

Encryption, Encryption protocols and Digital certifications

Encryption, Encryption protocols and Digital certifications

12th Grade

16 Qs

Unit 11: Cybersecurity

Unit 11: Cybersecurity

10th - 12th Grade

22 Qs

Encryption and Caesar Cipher Quiz

Encryption and Caesar Cipher Quiz

9th - 12th Grade

15 Qs

BJC U4L2 Encryption

BJC U4L2 Encryption

9th - 12th Grade

20 Qs

A level CS Unit 17 Security

A level CS Unit 17 Security

Assessment

Passage

Computers

12th Grade

Medium

Created by

Michael Harrington

Used 5+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term cipher when used in cryptography?
an encryption or decryption algorithm
an encrypted message
a type of session key
a digital signature
text following an encryption algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When carrying out asymmetric encryption, which of the following users would keep the private key?
the sender
the receiver
both sender and receiver
all recipients of the message
none of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, which of the following is the term used to describe the message before it is encrypted?
simpletext
plaintext
notext
ciphertext
firsttext

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the biggest disadvantage of using symmetric encryption?
it is very complex and time consuming
it is rarely used any more
the value of the key reads the same in both directions
it only works on computers with older operating systems
there is a security problem when transmitting the secret key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the correct name for a form of encryption in which both the sender and the recipient use the same key to encrypt/ decrypt?
symmetric key encryption
asymmetric key encryption
public key encryption
same key encryption
block cipher encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is involved in temporary key generation?
session keys
private key and certificate
public key and certificate
master keys
public keys

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a correct statement about PKIs?
they use private and public keys but not digital certificates
they use digital signatures and public keys
they are a combination of digital certificates, public key cryptography and CAs
they use asymmetric keys, hashing algorithms and certificate authorities
they are a combination of digests, hashing algorithms and asymmetric cryptographic algorithms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?