Computer Science Quiz

Computer Science Quiz

University

20 Qs

quiz-placeholder

Similar activities

2 - Cybersecurity 101

2 - Cybersecurity 101

9th Grade - University

20 Qs

Cyber EOP - DoS, DDoS & Zero-Day DDoS By Mr. B

Cyber EOP - DoS, DDoS & Zero-Day DDoS By Mr. B

12th Grade - University

18 Qs

Security Threats

Security Threats

10th Grade - University

20 Qs

IAS 101 - Activity 3

IAS 101 - Activity 3

University

20 Qs

Internet (Part II)

Internet (Part II)

University

21 Qs

Cybersecurity and Data Privacy Vocabulary

Cybersecurity and Data Privacy Vocabulary

11th Grade - University

15 Qs

SC+ Phishing

SC+ Phishing

University

18 Qs

Kevin Mitnick

Kevin Mitnick

University

15 Qs

Computer Science Quiz

Computer Science Quiz

Assessment

Quiz

Computers

University

Hard

Created by

M N

Used 12+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

  • Which of the following is considered the most secure encryption algorithm as of now?

DES

  • RSA

  • AES

  • Blowfish

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which emerging technology is expected to significantly impact cybersecurity?

  • Quantum computing

  • 3D printing

  • Augmented reality

  • Blockchain

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The decentralized technology that enhances security by providing a tamper-resistant and transparent way to record transactions is called ____________.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What was the primary storage device used in computers during the 1980s?

  • Solid State Drives (SSD)

  • Floppy disks

  • Compact Discs (CDs)

  • Flash drives

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Media Image

(Select all that apply) What are characteristics of a strong password?

Long length

Consisting only of numbers

Use of common words

  • Use of special characters

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The process of converting plaintext into unreadable ciphertext using a specific algorithm is called ____________.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The practice of identifying and fixing vulnerabilities in a system to improve its security is known as ____________.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?