
Understanding IT Security and Cryptography
Authored by Kalpesh Sagar
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
31 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
What is a common type of IT security threat that involves tricking individuals into revealing sensitive information?
Phishing
Malware
Denial of Service
Man-in-the-Middle
Answer explanation
Phishing is a common IT security threat that deceives individuals into providing sensitive information, often through fake emails or websites. It specifically targets personal data, making it the correct answer.
2.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following is a computer network-based threat that involves overwhelming a system with traffic to make it unavailable?
Spyware
Denial of Service
Ransomware
Trojan Horse
Answer explanation
The correct answer is 'Denial of Service' (DoS), which is a network-based threat that floods a system with excessive traffic, rendering it unavailable to users. Other options like spyware and ransomware serve different malicious purposes.
3.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
What is the primary goal of information security?
To increase network speed
To protect data confidentiality, integrity, and availability
To reduce hardware costs
To improve software usability
Answer explanation
The primary goal of information security is to protect data confidentiality, integrity, and availability, ensuring that sensitive information is safeguarded against unauthorized access, alteration, and loss.
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which legal requirement affects the security of IT systems in the UK?
General Data Protection Regulation (GDPR)
Sarbanes-Oxley Act
Health Insurance Portability and Accountability Act (HIPAA)
Digital Millennium Copyright Act (DMCA)
Answer explanation
The General Data Protection Regulation (GDPR) is a key legal requirement in the UK that mandates strict data protection and privacy measures, directly impacting the security of IT systems handling personal data.
5.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
What is a potential impact of a security breach on an organisation?
Increased employee productivity
Loss of customer trust and financial loss
Improved public relations
Enhanced system performance
Answer explanation
A security breach can lead to significant loss of customer trust, as clients may feel their data is not safe. This often results in financial loss due to decreased sales and potential legal costs, making it the most impactful consequence.
6.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which principle of cryptography ensures that a message can only be read by the intended recipient?
Integrity
Confidentiality
Availability
Non-repudiation
Answer explanation
Confidentiality is the principle that ensures only the intended recipient can read a message, protecting it from unauthorized access. This is crucial for secure communication.
7.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which cryptographic method uses the same key for both encryption and decryption?
Asymmetric encryption
Symmetric encryption
Hashing
Digital signatures
Answer explanation
Symmetric encryption uses the same key for both encryption and decryption, making it efficient for secure data transmission. In contrast, asymmetric encryption uses a pair of keys, and hashing is a one-way function, not for encryption.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
30 questions
PHOTOSHOP
Quiz
•
12th Grade
26 questions
Macromedia Flash
Quiz
•
8th Grade - Professio...
26 questions
Software Development Life Cycle
Quiz
•
9th - 12th Grade
30 questions
Jaringan Berbasis Luas (WAN)
Quiz
•
1st - 12th Grade
26 questions
General Knowledge
Quiz
•
5th Grade - University
26 questions
Digital marketer - Revision Quiz 5
Quiz
•
9th - 12th Grade
35 questions
MIL_1ST_QUIZ
Quiz
•
12th Grade
29 questions
Computer Parts
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade