икт 8

икт 8

University

25 Qs

quiz-placeholder

Similar activities

DTS & CG/SG

DTS & CG/SG

University

25 Qs

IAS QUIZ 9

IAS QUIZ 9

University

25 Qs

SSL/TLS

SSL/TLS

University

20 Qs

Cyber Security

Cyber Security

University

23 Qs

Cybersecurity Essentials Chapter 4 Review

Cybersecurity Essentials Chapter 4 Review

9th Grade - University

25 Qs

DSP-Minor1

DSP-Minor1

University

20 Qs

Public key cryptosystems

Public key cryptosystems

University

22 Qs

BSA - Elec - Finals

BSA - Elec - Finals

University

20 Qs

икт 8

икт 8

Assessment

Quiz

Computers

University

Hard

Created by

Dias Serdembaev

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The conversion process in which the source text is replaced with ciphertext is…

encryption

decryption

decoding

coding

authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the basis of the anti-virus program?

Waiting for the start of a virus attack.

Backup of all files .

Constant check of removable data carriers.

Deleting the infected files .

Comparison of program codes with codes of known viruses.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Polymorphic Virus  …

changes the contents of files and disk sectors.

substitutes instead of itself the non-infected sections of information.

encrypts and changes their coding so they are harder to detect.

can be quite easily detected and destroyed

it is activated when a certain trigger condition occurs.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The word  is encoded  using a substitution method and  looks  like  “946150556175”.

ONLINE

SECRET

CRYPTO

CIPHER

HACKER


5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer virus?*

A program that can self-replicate and attach itself to various objects or resources of computer systems, networks without user knowledge.

A program that contains promotional information and opens without user request.

A program that runs itself when you turn on your computer.

A code that prevents external devices from connecting to your computer.

A special microchip, which determines the correct operation of the computer.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A method of protecting information based to transform messages in ways that are hard to decipher.

Cryptography

Cryptology

Cryptanalysis

Authorization

Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The cipher where some pseudo-random sequence generated from the key is superimposed on the source text.  

transposition

open

gamming

block

substitution

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?