Encryption Quiz

Encryption Quiz

10th Grade

15 Qs

quiz-placeholder

Similar activities

Encryption and Caesar Cipher Quiz

Encryption and Caesar Cipher Quiz

9th - 12th Grade

15 Qs

2.3 Encryption Cambridge IGCSE 0478

2.3 Encryption Cambridge IGCSE 0478

10th Grade

10 Qs

Data Transmission

Data Transmission

9th - 12th Grade

12 Qs

Networks, WiFi and Encryption

Networks, WiFi and Encryption

9th - 10th Grade

10 Qs

Year 10 Data Transmission

Year 10 Data Transmission

9th - 12th Grade

13 Qs

CSP Unit 10 Pre-Assessment - Cybersecurity

CSP Unit 10 Pre-Assessment - Cybersecurity

9th - 12th Grade

10 Qs

Cryptography

Cryptography

8th - 10th Grade

20 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Encryption Quiz

Encryption Quiz

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Shenaz Chaumoo

Used 5+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term ciphertext when used in encryption?

an encryption or decryption algorithm

a message before it has been encrypted

a type of session key

another name for plaintext

text following an encryption algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following statements about asymmetric encryption is true?

uses a public key only

uses both a public key and a private key

always uses 64-bit encryption

the value of the private key is symmetrical

uses private key only

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In encryption, which of the following is the term used to describe the message before it is encrypted?

simpletext

plaintext

notext

ciphertext

firsttext

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the biggest disadvantage of using symmetric encryption?

it is very complex and time consuming

it is rarely used anymore

the value of the key reads the same in both directions

it only works on computers with older operating systems

there is a security problem when transmitting the encryption key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the correct name for a form of encryption in which both the sender and the recipient use the same key to encrypt and decrypt?

symmetric key encryption

asymmetric key encryption

public key encryption

same key encryption

block cipher encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the final number in a code, calculated from all the numbers in the code, whose purpose is to find errors in data entry?

parity check

checksum

cyclic redundancy check

parity bit

check digit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a form of error detection that makes use of a system of acknowledgements and timeouts?

automatic repeat request

echo check

check digit

parity bit

cyclic redundancy check

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?