Chapter 4 on Cryptography and Security

Chapter 4 on Cryptography and Security

12th Grade

25 Qs

quiz-placeholder

Similar activities

IAS1-Quiz No. 2 (final term) 6-9 late

IAS1-Quiz No. 2 (final term) 6-9 late

12th Grade

20 Qs

4CiphersCeasarAtbashRot13Affine

4CiphersCeasarAtbashRot13Affine

9th - 12th Grade

20 Qs

Encryption 1 AS

Encryption 1 AS

12th Grade

23 Qs

Internet Security

Internet Security

12th Grade

20 Qs

Relational Database Management System

Relational Database Management System

12th Grade

20 Qs

Practice for 8th AP CSP quiz

Practice for 8th AP CSP quiz

10th - 12th Grade

20 Qs

HOME AND UPPER ROW KEYS TEST

HOME AND UPPER ROW KEYS TEST

6th - 12th Grade

20 Qs

CSP AP Mid Term Review

CSP AP Mid Term Review

9th - 12th Grade

20 Qs

Chapter 4 on Cryptography and Security

Chapter 4 on Cryptography and Security

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Stella Lai

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

RSA

Diffie-Hellman

WEP

DES

hashing

Answer explanation

The Diffie-Hellman algorithm is specifically designed for secure key exchange, allowing two parties to generate a shared secret over an insecure channel. RSA is for encryption, while WEP and DES are not asymmetric algorithms.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

transposition

symmetric

asymmetric

one-time pad

Answer explanation

The correct answer is 'asymmetric' because this encryption algorithm uses a pair of keys: one for encryption and a different one for decryption, unlike symmetric algorithms which use the same key for both processes.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

block

stream

hash

enigma

elliptical

Answer explanation

A stream cipher encrypts plaintext one byte or one bit at a time, making it suitable for real-time data transmission. In contrast, block ciphers encrypt fixed-size blocks of data, which is why 'stream' is the correct answer.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

ECC

RSA

AES

El-Gamal

IDEA

Answer explanation

ECC, or Elliptic Curve Cryptography, is the algorithm used by the NSA for digital signatures and key exchange, leveraging the mathematical properties of elliptic curves for enhanced security and efficiency.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the science of making and breaking secret codes?

factorization

cryptology

impersonation

spoofing

jamming

Answer explanation

The science of making and breaking secret codes is known as cryptology. It encompasses both cryptography (creating codes) and cryptanalysis (breaking codes), making it the correct term for this field.

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three processes are examples of logical access controls? (Choose three.)

intrusion detection system (IDS) to watch for suspicious network activity

firewalls to monitor traffic

fences to protect the perimeter of a building

biometrics to validate physical characteristics

guards to monitor security screens

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

masking

hiding

obfuscation

steganography

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?