Unit 4 #7

Unit 4 #7

12th Grade

10 Qs

quiz-placeholder

Similar activities

Chemical Reactions

Chemical Reactions

1st - 12th Grade

12 Qs

Charles and Boyles Law

Charles and Boyles Law

7th - 12th Grade

15 Qs

Test 4 P2

Test 4 P2

12th Grade

10 Qs

Technology Quiz

Technology Quiz

KG - University

9 Qs

Probe-o-grade

Probe-o-grade

10th Grade - University

10 Qs

QUIZ 1

QUIZ 1

12th Grade - University

14 Qs

Green Chemistry: Eco-Friendly Clothing

Green Chemistry: Eco-Friendly Clothing

9th - 12th Grade

8 Qs

Thermochemistry - Quiz 1

Thermochemistry - Quiz 1

10th - 12th Grade

11 Qs

Unit 4 #7

Unit 4 #7

Assessment

Quiz

Chemistry

12th Grade

Easy

Created by

Clifford Buckles

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best exemplifies the use of multifactor authentication to protect an online banking system?

When a user resets a password for an online bank account, the user is required to enter the new password twice.

When multiple people have a shared online bank account, they are each required to have their own unique username and password.

After entering a password for an online bank account, a user must also enter a code that is sent to the user’s phone via text message.

An online bank requires users to change their account passwords multiple times per year without using the same password twice.


2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In public key cryptography, the sender uses the recipient’s public key to encrypt a message. Which of the following is needed to decrypt the message?

Responses


The sender’s public key

The sender’s private key

The recipient’s public key


The recipient’s private key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following scenarios best exemplifies a phishing attack?

Responses


A user connects to a public wireless network. An unauthorized individual intercepts data transmitted on the network, looking for private information that can be used to gain access to the user’s accounts.

A user’s e-mail account is overwhelmed with messages containing large attachments, which causes the account to exceed the maximum amount of data allowed and temporarily prevents the user from sending and receiving new messages.

A user receives an e-mail from a sender offering technical help with the user’s computer. The e-mail prompts the user to start a help session by clicking a provided link and entering the username and password associated with the user’s computer.

A user chooses a weak password for an online account. An unauthorized individual successfully guesses the user’s password from a list of common passwords.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A city’s police department has installed cameras throughout city streets. The cameras capture and store license plate data from cars driven and parked throughout the city. The authorities use recorded license plate data to identify stolen cars and to enforce parking regulations.

Which of the following best describes a privacy risk that could occur if this method of data collection is misused?

The cameras may not be able to read license plates in poor weather conditions.

Local business owners could lose customers who are unwilling to park in the city.

Traffic personnel who work for the city could lose their jobs if their services are no longer needed.

The vehicle location data could be used to monitor the movements of city residents.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following has the greatest potential for compromising a user’s personal privacy?

A group of cookies stored by the user’s Web browser

The Internet Protocol (IP) address of the user’s computer

The user’s e-mail address


The user’s public key used for encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of symmetric encryption?

Responses


Evy buys a locked box that operates using two different codes. When the first code is entered, a slot opens that allows a message to be put in the box. When the second code is entered, the door to the box opens. Evy gives the first code to her friends so they can leave messages for her and keeps the second code to herself so that she is the only one who can retrieve the messages.

Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.

Hannah writes a message to send to Isabel and hides the message under a rock behind the soccer field. Hannah gives Isabel the exact location of the rock so that only Isabel can find the message.

Juan writes a message to send to Kelly and slides the message through a slot in the front of Kelly’s locker. Juan knows that Kelly has not shared her locker combination with anyone, so no one other than Kelly will be able to read the message.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

The activities of a user browsing in an anonymous window will not be visible to people who monitor the user’s network, such as the system administrator.

Items placed in a Web store’s shopping cart for future purchase during the anonymous browsing session will not be saved on the user’s computer.

A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.


A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Chemistry