Cybersecurity

Cybersecurity

12th Grade

18 Qs

quiz-placeholder

Similar activities

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

Design your website

Design your website

7th - 12th Grade

20 Qs

INTERNET CONNECTION

INTERNET CONNECTION

12th Grade

13 Qs

[Lớp 12] Access - Ôn tập

[Lớp 12] Access - Ôn tập

12th Grade

14 Qs

Problem Solving : Design Solution

Problem Solving : Design Solution

12th Grade

15 Qs

Ulangan Harian I Teknologi Layanan Jaringan (softswitch & VoIP)

Ulangan Harian I Teknologi Layanan Jaringan (softswitch & VoIP)

12th Grade

20 Qs

Computer Lab Rules

Computer Lab Rules

9th - 12th Grade

13 Qs

2021.10.15_ Đề kiểm tra tin học 12

2021.10.15_ Đề kiểm tra tin học 12

12th Grade

20 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Oshel Tampus

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It refers to the practice and study of techniques for secure communication in the presence of third parties, often referred to as adversaries. It involves creating and analyzing protocols that prevent third parties or the public from reading private messages.

Cybersecurity

Cryptography

Computer Security

Network Security

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is this security that refers to the practice of protecting system, networks, and programs from digital attacks?

Cybersecurity

Computer Security

Network Security

Cruptography

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

This is the practice of safeguarding digital networks and data from unauthorized access, misuse, alteration, or destruction?

Cybersecurity

Computer Security

Network Security

Cruptography

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It is one of the features of cryptography that means only information can be accessed by the person for whom it is intended, and no one can access without permission.

Authentication

Non-repudiation

Integrity

Confidentiality

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A feature of cryptography that confirmed the sender and receiver identities as well as the destination or origin of information.

Authentication

Non-repudiation

Integrity

Confidentiality

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which cryptographic type or technique involves the use of two keys, a public key for encryption and a private key for decryption?

Asymmetric key

Symmetric key

Hash function

Steganography

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A cryptographic technique that utilizes mathematical algorithm that takes an input and produces a fixed-size string of characters, which is typically a hexadecimal number?

Asymmetric key

Symmetric key

Hash function

Steganography

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?