Unit 4 #8
Quiz
•
Chemistry
•
12th Grade
•
Practice Problem
•
Easy
Clifford Buckles
Used 9+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a true statement about the use of public key encryption in transmitting messages?
Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.
Public key encryption is not considered a secure method of communication because a public key can be intercepted.
Public key encryption only allows the encryption of documents containing text; documents containing audio and video must use a different encryption method.
Public key encryption uses a single key that should be kept secure because it is used for both encryption and decryption.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best explains how a certificate authority is used in protecting data?
A certificate authority certifies the safety of a particular Web site so that users know that it does not contain any viruses.
A certificate authority issues passwords that grant access to secure databases.
A certificate authority maintains a secure database that maps all Web domain names to the IP addresses of the servers where the sites are hosted.
A certificate authority verifies the authenticity of encryption keys used in secured communications.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best exemplifies the use of multifactor authentication?
A computing device enables users to input information using multiple interfaces, including a keyboard, a mouse, and a touch pad.
A user employs a public key encryption method that uses one key to encrypt information and a different key to decrypt information.
A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.
Multiple users share an account to a Web-based software program, and each user has an individual username and password.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?
Internet users with a copy of the information might redistribute the personal information without first seeking permission.
There are potentially an extremely large number of devices on the Internet that may contain the information.
Automated technologies collect information about Internet users without their knowledge.
All personal information is stored online using authentication measures, making the information hard to access.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of an attack using a rogue access point?
An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.
An unauthorized individual physically disconnects an exposed network router, making the network unavailable to some users.
An unauthorized individual poses as a network administrator and attempts to trick a user into providing personal information.
A group of unauthorized individuals overwhelms a network router with traffic, making it unavailable to some users.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A student is writing a program to model different real-world events using simulations. Which of the following simulations will generate a result that would best be stored using a Boolean variable?
A simulation of flipping a fair coin
A simulation of rolling a fair die (with sides numbered 1 through 6)
A simulation of the temperature in a location over time
A simulation of traffic patterns on a road
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best explains how symmetric encryption algorithms are typically used?
Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.
Symmetric encryption uses a single key that should be made public. The same key is used for both encryption and decryption of data.
Symmetric encryption uses two keys that should both be kept secret. One key is used for encryption, and the other is used for decryption.
Symmetric encryption uses two keys. The key used for encryption should be made public, but the key used for decryption should be kept secret.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Quiz 1: Mole Concept
Quiz
•
12th Grade - University
10 questions
FORM 5- HEAT OF REACTION-SET 6
Quiz
•
12th Grade
11 questions
Matter and Atomic Structure
Quiz
•
10th - 12th Grade
15 questions
check your chemistry vocalbulary
Quiz
•
9th - 12th Grade
10 questions
Amides
Quiz
•
1st Grade - University
10 questions
Penyetaraan Rodoks
Quiz
•
12th Grade
10 questions
Chemistry Regent - June 2013 Q31-40
Quiz
•
9th - 12th Grade
10 questions
Redox Balancing Practice (acid solution)
Quiz
•
10th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Chemistry
20 questions
Types of Chemical Reactions
Quiz
•
9th - 12th Grade
20 questions
Energy Transformations
Quiz
•
9th - 12th Grade
24 questions
Identifying Types of Chemical Reactions
Quiz
•
10th - 12th Grade
20 questions
Atomic Structure
Quiz
•
10th - 12th Grade
24 questions
Unit 4 Test Practice: Bonding and Properties
Quiz
•
10th - 12th Grade
21 questions
Introduction to Moles
Lesson
•
9th - 12th Grade
24 questions
ERHS Chem - Chapter 7 Chemical Reactions
Quiz
•
10th - 12th Grade
13 questions
Balanced Eqns & Cons of Mass
Quiz
•
9th - 12th Grade
