Chapter 4 Cybersecurity

Chapter 4 Cybersecurity

University

10 Qs

quiz-placeholder

Similar activities

LESSON 6 CRYPTOGRAPHY

LESSON 6 CRYPTOGRAPHY

University

14 Qs

English Computer

English Computer

University

11 Qs

Cryptography

Cryptography

University

10 Qs

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

Cryptography

Cryptography

University

15 Qs

CNET151 Chapt 8 Encryption

CNET151 Chapt 8 Encryption

University

15 Qs

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

12th Grade - University

15 Qs

Chapter 4 Cybersecurity

Chapter 4 Cybersecurity

Assessment

Quiz

Computers

University

Hard

Created by

Ria Castillo

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

asymmetric

symmetric

one-time pad

transposition

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

Vignere

Caesar

AES

3DES

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

RSA

AES

IDEA

ECC

4.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

What are three examples of administrative access controls? (Choose two.)

guard dogs

policies and procedures

encryption

background checks

5.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

Which three processes are examples of logical access controls? (Choose three.)

fences to protect the perimeter of a building

biometrics to validate physical characteristics


swipe cards to allow access to a restricted area

intrusion detection system (IDS) to watch for suspicious network activity

firewalls to monitor traffic

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

_______________ encryption algorithms use the same pre-shared key to encrypt and decrypt data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the technology that protects software from unauthorized access or modification?

copyright

trademark

watermarking

access control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?