
Chapter 4 on Cryptography and Security

Quiz
•
Computers
•
12th Grade
•
Hard
Stella Lai
Used 3+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
RSA
Diffie-Hellman
WEP
DES
hashing
Answer explanation
The Diffie-Hellman algorithm is specifically designed for secure key exchange, allowing two parties to generate a shared secret over an insecure channel. RSA is for encryption, while WEP and DES are not asymmetric algorithms.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
transposition
symmetric
asymmetric
one-time pad
Answer explanation
The correct answer is 'asymmetric' because this encryption algorithm uses a pair of keys: one for encryption and a different one for decryption, unlike symmetric algorithms which use the same key for both processes.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of cipher encrypts plaintext one byte or one bit at a time?
block
stream
hash
enigma
elliptical
Answer explanation
A stream cipher encrypts plaintext one byte or one bit at a time, making it suitable for real-time data transmission. In contrast, block ciphers encrypt fixed-size blocks of data, which is why 'stream' is the correct answer.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?
ECC
RSA
AES
El-Gamal
IDEA
Answer explanation
ECC, or Elliptic Curve Cryptography, is the algorithm used by the NSA for digital signatures and key exchange, leveraging the mathematical properties of elliptic curves for enhanced security and efficiency.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used to describe the science of making and breaking secret codes?
factorization
cryptology
impersonation
spoofing
jamming
Answer explanation
The science of making and breaking secret codes is known as cryptology. It encompasses both cryptography (creating codes) and cryptanalysis (breaking codes), making it the correct term for this field.
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which three processes are examples of logical access controls? (Choose three.)
intrusion detection system (IDS) to watch for suspicious network activity
firewalls to monitor traffic
fences to protect the perimeter of a building
biometrics to validate physical characteristics
guards to monitor security screens
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
masking
hiding
obfuscation
steganography
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
SQL Commands Part 1

Quiz
•
11th - 12th Grade
20 questions
Cyber security

Quiz
•
9th - 12th Grade
20 questions
Excel - Formulas, Functions & Formatting

Quiz
•
10th - 12th Grade
20 questions
Cybersecurity

Quiz
•
9th - 12th Grade
27 questions
Java Swing/AWT Graphics

Quiz
•
9th - 12th Grade
20 questions
data bases

Quiz
•
12th Grade
20 questions
Microsoft Word 2013Review

Quiz
•
KG - University
28 questions
Ch15-Compression, Encryption and Hashing

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade