Unit 4 #8
Quiz
•
Chemistry
•
12th Grade
•
Practice Problem
•
Easy
Clifford Buckles
Used 9+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a true statement about the use of public key encryption in transmitting messages?
Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.
Public key encryption is not considered a secure method of communication because a public key can be intercepted.
Public key encryption only allows the encryption of documents containing text; documents containing audio and video must use a different encryption method.
Public key encryption uses a single key that should be kept secure because it is used for both encryption and decryption.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best explains how a certificate authority is used in protecting data?
A certificate authority certifies the safety of a particular Web site so that users know that it does not contain any viruses.
A certificate authority issues passwords that grant access to secure databases.
A certificate authority maintains a secure database that maps all Web domain names to the IP addresses of the servers where the sites are hosted.
A certificate authority verifies the authenticity of encryption keys used in secured communications.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best exemplifies the use of multifactor authentication?
A computing device enables users to input information using multiple interfaces, including a keyboard, a mouse, and a touch pad.
A user employs a public key encryption method that uses one key to encrypt information and a different key to decrypt information.
A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.
Multiple users share an account to a Web-based software program, and each user has an individual username and password.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?
Internet users with a copy of the information might redistribute the personal information without first seeking permission.
There are potentially an extremely large number of devices on the Internet that may contain the information.
Automated technologies collect information about Internet users without their knowledge.
All personal information is stored online using authentication measures, making the information hard to access.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of an attack using a rogue access point?
An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.
An unauthorized individual physically disconnects an exposed network router, making the network unavailable to some users.
An unauthorized individual poses as a network administrator and attempts to trick a user into providing personal information.
A group of unauthorized individuals overwhelms a network router with traffic, making it unavailable to some users.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A student is writing a program to model different real-world events using simulations. Which of the following simulations will generate a result that would best be stored using a Boolean variable?
A simulation of flipping a fair coin
A simulation of rolling a fair die (with sides numbered 1 through 6)
A simulation of the temperature in a location over time
A simulation of traffic patterns on a road
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best explains how symmetric encryption algorithms are typically used?
Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.
Symmetric encryption uses a single key that should be made public. The same key is used for both encryption and decryption of data.
Symmetric encryption uses two keys that should both be kept secret. One key is used for encryption, and the other is used for decryption.
Symmetric encryption uses two keys. The key used for encryption should be made public, but the key used for decryption should be kept secret.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
11 questions
TEORÍA ATOMICA
Quiz
•
12th Grade
15 questions
Factors that affect chemical equilibrium
Quiz
•
12th Grade
15 questions
Quiz sobre Modelos Atómicos
Quiz
•
12th Grade - University
11 questions
VESPR Grade 10as
Quiz
•
11th - 12th Grade
13 questions
Metallic solids
Quiz
•
12th Grade
10 questions
Unit 6 - Types of Bonding - Post Quiz
Quiz
•
9th - 12th Grade
15 questions
Introducción Termodinámica y Equilibrio químico
Quiz
•
12th Grade
15 questions
7.4 Collision Theory
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
