Which of the following is a true statement about the use of public key encryption in transmitting messages?
Unit 4 #8

Quiz
•
Chemistry
•
12th Grade
•
Easy
Clifford Buckles
Used 9+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.
Public key encryption is not considered a secure method of communication because a public key can be intercepted.
Public key encryption only allows the encryption of documents containing text; documents containing audio and video must use a different encryption method.
Public key encryption uses a single key that should be kept secure because it is used for both encryption and decryption.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best explains how a certificate authority is used in protecting data?
A certificate authority certifies the safety of a particular Web site so that users know that it does not contain any viruses.
A certificate authority issues passwords that grant access to secure databases.
A certificate authority maintains a secure database that maps all Web domain names to the IP addresses of the servers where the sites are hosted.
A certificate authority verifies the authenticity of encryption keys used in secured communications.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best exemplifies the use of multifactor authentication?
A computing device enables users to input information using multiple interfaces, including a keyboard, a mouse, and a touch pad.
A user employs a public key encryption method that uses one key to encrypt information and a different key to decrypt information.
A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.
Multiple users share an account to a Web-based software program, and each user has an individual username and password.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?
Internet users with a copy of the information might redistribute the personal information without first seeking permission.
There are potentially an extremely large number of devices on the Internet that may contain the information.
Automated technologies collect information about Internet users without their knowledge.
All personal information is stored online using authentication measures, making the information hard to access.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of an attack using a rogue access point?
An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.
An unauthorized individual physically disconnects an exposed network router, making the network unavailable to some users.
An unauthorized individual poses as a network administrator and attempts to trick a user into providing personal information.
A group of unauthorized individuals overwhelms a network router with traffic, making it unavailable to some users.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A student is writing a program to model different real-world events using simulations. Which of the following simulations will generate a result that would best be stored using a Boolean variable?
A simulation of flipping a fair coin
A simulation of rolling a fair die (with sides numbered 1 through 6)
A simulation of the temperature in a location over time
A simulation of traffic patterns on a road
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best explains how symmetric encryption algorithms are typically used?
Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.
Symmetric encryption uses a single key that should be made public. The same key is used for both encryption and decryption of data.
Symmetric encryption uses two keys that should both be kept secret. One key is used for encryption, and the other is used for decryption.
Symmetric encryption uses two keys. The key used for encryption should be made public, but the key used for decryption should be kept secret.
Create a free account and access millions of resources
Similar Resources on Quizizz
12 questions
Formulas/Reactions (Blue Stamp Sheet)

Quiz
•
9th - 12th Grade
10 questions
Non-Enzymatic Browning Quiz

Quiz
•
12th Grade
15 questions
Proton

Quiz
•
6th - 12th Grade
15 questions
Protons Identity

Quiz
•
6th - 12th Grade
10 questions
Physical Science Quiz 5

Quiz
•
12th Grade
10 questions
Organic Compounds

Quiz
•
12th Grade
15 questions
Earth - Level 9 Test

Quiz
•
9th Grade - University
15 questions
Protons

Quiz
•
6th - 12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade