Unit 4 #8

Quiz
•
Chemistry
•
12th Grade
•
Easy
Clifford Buckles
Used 9+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a true statement about the use of public key encryption in transmitting messages?
Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.
Public key encryption is not considered a secure method of communication because a public key can be intercepted.
Public key encryption only allows the encryption of documents containing text; documents containing audio and video must use a different encryption method.
Public key encryption uses a single key that should be kept secure because it is used for both encryption and decryption.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best explains how a certificate authority is used in protecting data?
A certificate authority certifies the safety of a particular Web site so that users know that it does not contain any viruses.
A certificate authority issues passwords that grant access to secure databases.
A certificate authority maintains a secure database that maps all Web domain names to the IP addresses of the servers where the sites are hosted.
A certificate authority verifies the authenticity of encryption keys used in secured communications.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best exemplifies the use of multifactor authentication?
A computing device enables users to input information using multiple interfaces, including a keyboard, a mouse, and a touch pad.
A user employs a public key encryption method that uses one key to encrypt information and a different key to decrypt information.
A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.
Multiple users share an account to a Web-based software program, and each user has an individual username and password.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?
Internet users with a copy of the information might redistribute the personal information without first seeking permission.
There are potentially an extremely large number of devices on the Internet that may contain the information.
Automated technologies collect information about Internet users without their knowledge.
All personal information is stored online using authentication measures, making the information hard to access.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of an attack using a rogue access point?
An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.
An unauthorized individual physically disconnects an exposed network router, making the network unavailable to some users.
An unauthorized individual poses as a network administrator and attempts to trick a user into providing personal information.
A group of unauthorized individuals overwhelms a network router with traffic, making it unavailable to some users.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A student is writing a program to model different real-world events using simulations. Which of the following simulations will generate a result that would best be stored using a Boolean variable?
A simulation of flipping a fair coin
A simulation of rolling a fair die (with sides numbered 1 through 6)
A simulation of the temperature in a location over time
A simulation of traffic patterns on a road
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best explains how symmetric encryption algorithms are typically used?
Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.
Symmetric encryption uses a single key that should be made public. The same key is used for both encryption and decryption of data.
Symmetric encryption uses two keys that should both be kept secret. One key is used for encryption, and the other is used for decryption.
Symmetric encryption uses two keys. The key used for encryption should be made public, but the key used for decryption should be kept secret.
Create a free account and access millions of resources
Similar Resources on Wayground
6 questions
Solutions | Starter Quiz | Oak National Academy

Quiz
•
9th Grade - University
15 questions
Distillation

Quiz
•
12th Grade
10 questions
Oct- 10 CHEM QUIZ

Quiz
•
KG - Professional Dev...
10 questions
Unit 4 #7

Quiz
•
12th Grade
10 questions
CRYSTALLINE AND AMORPHOUS SOLIDS

Quiz
•
11th - 12th Grade
10 questions
AP Chemistry 3.2

Quiz
•
11th - 12th Grade
10 questions
Tertiary Structure of Protein

Quiz
•
12th Grade
15 questions
11-04: Electrolytic Cells

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
12 questions
Unit Zero lesson 2 cafeteria

Lesson
•
9th - 12th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
20 questions
Lab Safety and Equipment

Quiz
•
8th Grade
13 questions
25-26 Behavior Expectations Matrix

Quiz
•
9th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Chemistry
20 questions
Lab Safety and Lab Equipment

Quiz
•
9th - 12th Grade
20 questions
Lab Equipment Quiz Chemistry

Quiz
•
9th - 12th Grade
30 questions
ACA Unit 1 Atomic Structure

Quiz
•
9th - 12th Grade
20 questions
States of Matter and Phase Changes

Quiz
•
9th - 12th Grade
8 questions
Metric System

Lesson
•
9th - 12th Grade
14 questions
Ice breaker

Lesson
•
9th - 12th Grade
20 questions
Lab Safety and Equipment

Quiz
•
9th - 12th Grade
20 questions
Chemistry Equipment

Quiz
•
9th - 12th Grade