
Understanding IT Security and Cryptography
Authored by Kalpesh Sagar
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
31 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
What is a common type of IT security threat that involves tricking individuals into revealing sensitive information?
Phishing
Malware
Denial of Service
Man-in-the-Middle
Answer explanation
Phishing is a common IT security threat that deceives individuals into providing sensitive information, often through fake emails or websites. It specifically targets personal data, making it the correct answer.
2.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following is a computer network-based threat that involves overwhelming a system with traffic to make it unavailable?
Spyware
Denial of Service
Ransomware
Trojan Horse
Answer explanation
The correct answer is 'Denial of Service' (DoS), which is a network-based threat that floods a system with excessive traffic, rendering it unavailable to users. Other options like spyware and ransomware serve different malicious purposes.
3.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
What is the primary goal of information security?
To increase network speed
To protect data confidentiality, integrity, and availability
To reduce hardware costs
To improve software usability
Answer explanation
The primary goal of information security is to protect data confidentiality, integrity, and availability, ensuring that sensitive information is safeguarded against unauthorized access, alteration, and loss.
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which legal requirement affects the security of IT systems in the UK?
General Data Protection Regulation (GDPR)
Sarbanes-Oxley Act
Health Insurance Portability and Accountability Act (HIPAA)
Digital Millennium Copyright Act (DMCA)
Answer explanation
The General Data Protection Regulation (GDPR) is a key legal requirement in the UK that mandates strict data protection and privacy measures, directly impacting the security of IT systems handling personal data.
5.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
What is a potential impact of a security breach on an organisation?
Increased employee productivity
Loss of customer trust and financial loss
Improved public relations
Enhanced system performance
Answer explanation
A security breach can lead to significant loss of customer trust, as clients may feel their data is not safe. This often results in financial loss due to decreased sales and potential legal costs, making it the most impactful consequence.
6.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which principle of cryptography ensures that a message can only be read by the intended recipient?
Integrity
Confidentiality
Availability
Non-repudiation
Answer explanation
Confidentiality is the principle that ensures only the intended recipient can read a message, protecting it from unauthorized access. This is crucial for secure communication.
7.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which cryptographic method uses the same key for both encryption and decryption?
Asymmetric encryption
Symmetric encryption
Hashing
Digital signatures
Answer explanation
Symmetric encryption uses the same key for both encryption and decryption, making it efficient for secure data transmission. In contrast, asymmetric encryption uses a pair of keys, and hashing is a one-way function, not for encryption.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?