Chapter 4 Cybersecurity

Chapter 4 Cybersecurity

University

10 Qs

quiz-placeholder

Similar activities

Algorithm, Pseudocode and Flowchart

Algorithm, Pseudocode and Flowchart

University

10 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

Chapter 6 (Fundamentals of Cybersecurity

Chapter 6 (Fundamentals of Cybersecurity

University

10 Qs

Exo-Automatos

Exo-Automatos

University

10 Qs

Lesson 6 - Web Trojan

Lesson 6 - Web Trojan

University

8 Qs

TAC3121-Quiz 5

TAC3121-Quiz 5

University

10 Qs

Additional Excercise (Network Layer) - Router, IPv4 and IPv6

Additional Excercise (Network Layer) - Router, IPv4 and IPv6

University

12 Qs

Croteau SY110 L18&19 AY25

Croteau SY110 L18&19 AY25

University

6 Qs

Chapter 4 Cybersecurity

Chapter 4 Cybersecurity

Assessment

Quiz

Computers

University

Hard

Created by

Ria Castillo

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

asymmetric

symmetric

one-time pad

transposition

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

Vignere

Caesar

AES

3DES

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

RSA

AES

IDEA

ECC

4.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

What are three examples of administrative access controls? (Choose two.)

guard dogs

policies and procedures

encryption

background checks

5.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

Which three processes are examples of logical access controls? (Choose three.)

fences to protect the perimeter of a building

biometrics to validate physical characteristics


swipe cards to allow access to a restricted area

intrusion detection system (IDS) to watch for suspicious network activity

firewalls to monitor traffic

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

_______________ encryption algorithms use the same pre-shared key to encrypt and decrypt data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the technology that protects software from unauthorized access or modification?

copyright

trademark

watermarking

access control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?