
Chapter 4 on Cryptography and Security
Authored by Stella Lai
Computers
12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
RSA
Diffie-Hellman
WEP
DES
hashing
Answer explanation
The Diffie-Hellman algorithm is specifically designed for secure key exchange, allowing two parties to generate a shared secret over an insecure channel. RSA is for encryption, while WEP and DES are not asymmetric algorithms.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
transposition
symmetric
asymmetric
one-time pad
Answer explanation
The correct answer is 'asymmetric' because this encryption algorithm uses a pair of keys: one for encryption and a different one for decryption, unlike symmetric algorithms which use the same key for both processes.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of cipher encrypts plaintext one byte or one bit at a time?
block
stream
hash
enigma
elliptical
Answer explanation
A stream cipher encrypts plaintext one byte or one bit at a time, making it suitable for real-time data transmission. In contrast, block ciphers encrypt fixed-size blocks of data, which is why 'stream' is the correct answer.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?
ECC
RSA
AES
El-Gamal
IDEA
Answer explanation
ECC, or Elliptic Curve Cryptography, is the algorithm used by the NSA for digital signatures and key exchange, leveraging the mathematical properties of elliptic curves for enhanced security and efficiency.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used to describe the science of making and breaking secret codes?
factorization
cryptology
impersonation
spoofing
jamming
Answer explanation
The science of making and breaking secret codes is known as cryptology. It encompasses both cryptography (creating codes) and cryptanalysis (breaking codes), making it the correct term for this field.
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which three processes are examples of logical access controls? (Choose three.)
intrusion detection system (IDS) to watch for suspicious network activity
firewalls to monitor traffic
fences to protect the perimeter of a building
biometrics to validate physical characteristics
guards to monitor security screens
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
masking
hiding
obfuscation
steganography
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
DCD3533 PROJECT MANAGEMENT
Quiz
•
9th - 12th Grade
20 questions
System and network support and management
Quiz
•
11th Grade - Professi...
20 questions
Linux Directory Structures
Quiz
•
10th Grade - University
20 questions
ฐานข้อมูลเบื้องต้น
Quiz
•
1st - 12th Grade
20 questions
Computer parts
Quiz
•
1st - 12th Grade
20 questions
Database Management Tools
Quiz
•
9th - 12th Grade
20 questions
DATA VISUALIZATION_B
Quiz
•
9th - 12th Grade
20 questions
QUIZ 3 SAM
Quiz
•
12th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Factor Quadratic Expressions with Various Coefficients
Quiz
•
9th - 12th Grade
18 questions
Success Strategies
Quiz
•
9th - 12th Grade
10 questions
Valentine's Day Trivia
Quiz
•
9th - 12th Grade