Search Header Logo

Chapter 4 Cybersecurity

Authored by Ria Castillo

Computers

University

Used 2+ times

Chapter 4 Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

asymmetric

symmetric

one-time pad

transposition

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

Vignere

Caesar

AES

3DES

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

RSA

AES

IDEA

ECC

4.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

What are three examples of administrative access controls? (Choose two.)

guard dogs

policies and procedures

encryption

background checks

5.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

Which three processes are examples of logical access controls? (Choose three.)

fences to protect the perimeter of a building

biometrics to validate physical characteristics


swipe cards to allow access to a restricted area

intrusion detection system (IDS) to watch for suspicious network activity

firewalls to monitor traffic

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

_______________ encryption algorithms use the same pre-shared key to encrypt and decrypt data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the technology that protects software from unauthorized access or modification?

copyright

trademark

watermarking

access control

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers