Unit 4 #8

Unit 4 #8

12th Grade

10 Qs

quiz-placeholder

Similar activities

WEEK 6-3.3 ELECTROLYTIC CELL

WEEK 6-3.3 ELECTROLYTIC CELL

10th Grade - University

10 Qs

11.1 - Planning a research investigation

11.1 - Planning a research investigation

11th - 12th Grade

10 Qs

Chemistry - Oct 6, 2021

Chemistry - Oct 6, 2021

10th - 12th Grade

10 Qs

Molecules

Molecules

4th Grade - University

10 Qs

Tertiary Structure of Protein

Tertiary Structure of Protein

12th Grade

10 Qs

Unit 4 #7

Unit 4 #7

12th Grade

10 Qs

Carbohydrates open ended

Carbohydrates open ended

9th - 12th Grade

11 Qs

Electrochemical Cell Do Now

Electrochemical Cell Do Now

10th - 12th Grade

10 Qs

Unit 4 #8

Unit 4 #8

Assessment

Quiz

Chemistry

12th Grade

Easy

Created by

Clifford Buckles

Used 9+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a true statement about the use of public key encryption in transmitting messages?

Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.

Public key encryption is not considered a secure method of communication because a public key can be intercepted.

Public key encryption only allows the encryption of documents containing text; documents containing audio and video must use a different encryption method.

Public key encryption uses a single key that should be kept secure because it is used for both encryption and decryption.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best explains how a certificate authority is used in protecting data?

A certificate authority certifies the safety of a particular Web site so that users know that it does not contain any viruses.

A certificate authority issues passwords that grant access to secure databases.

A certificate authority maintains a secure database that maps all Web domain names to the IP addresses of the servers where the sites are hosted.

A certificate authority verifies the authenticity of encryption keys used in secured communications.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best exemplifies the use of multifactor authentication?

A computing device enables users to input information using multiple interfaces, including a keyboard, a mouse, and a touch pad.

A user employs a public key encryption method that uses one key to encrypt information and a different key to decrypt information.

A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.

Multiple users share an account to a Web-based software program, and each user has an individual username and password.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?


Internet users with a copy of the information might redistribute the personal information without first seeking permission.

There are potentially an extremely large number of devices on the Internet that may contain the information.

Automated technologies collect information about Internet users without their knowledge.

All personal information is stored online using authentication measures, making the information hard to access.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an attack using a rogue access point?


An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.

An unauthorized individual physically disconnects an exposed network router, making the network unavailable to some users.

An unauthorized individual poses as a network administrator and attempts to trick a user into providing personal information.

A group of unauthorized individuals overwhelms a network router with traffic, making it unavailable to some users.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A student is writing a program to model different real-world events using simulations. Which of the following simulations will generate a result that would best be stored using a Boolean variable?


A simulation of flipping a fair coin

A simulation of rolling a fair die (with sides numbered 1 through 6)

A simulation of the temperature in a location over time


A simulation of traffic patterns on a road

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best explains how symmetric encryption algorithms are typically used?

Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.


Symmetric encryption uses a single key that should be made public. The same key is used for both encryption and decryption of data.

Symmetric encryption uses two keys that should both be kept secret. One key is used for encryption, and the other is used for decryption.

Symmetric encryption uses two keys. The key used for encryption should be made public, but the key used for decryption should be kept secret.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?