Search Header Logo

Understanding IT Security and Cryptography

Authored by Kalpesh Sagar

Computers

12th Grade

Used 2+ times

Understanding IT Security and Cryptography
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is a common type of IT security threat that involves tricking individuals into revealing sensitive information?

Phishing

Malware

Denial of Service

Man-in-the-Middle

Answer explanation

Phishing is a common IT security threat that deceives individuals into providing sensitive information, often through fake emails or websites. It specifically targets personal data, making it the correct answer.

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following is a computer network-based threat that involves overwhelming a system with traffic to make it unavailable?

Spyware

Denial of Service

Ransomware

Trojan Horse

Answer explanation

The correct answer is 'Denial of Service' (DoS), which is a network-based threat that floods a system with excessive traffic, rendering it unavailable to users. Other options like spyware and ransomware serve different malicious purposes.

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the primary goal of information security?

To increase network speed

To protect data confidentiality, integrity, and availability

To reduce hardware costs

To improve software usability

Answer explanation

The primary goal of information security is to protect data confidentiality, integrity, and availability, ensuring that sensitive information is safeguarded against unauthorized access, alteration, and loss.

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which legal requirement affects the security of IT systems in the UK?

General Data Protection Regulation (GDPR)

Sarbanes-Oxley Act

Health Insurance Portability and Accountability Act (HIPAA)

Digital Millennium Copyright Act (DMCA)

Answer explanation

The General Data Protection Regulation (GDPR) is a key legal requirement in the UK that mandates strict data protection and privacy measures, directly impacting the security of IT systems handling personal data.

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is a potential impact of a security breach on an organisation?

Increased employee productivity

Loss of customer trust and financial loss

Improved public relations

Enhanced system performance

Answer explanation

A security breach can lead to significant loss of customer trust, as clients may feel their data is not safe. This often results in financial loss due to decreased sales and potential legal costs, making it the most impactful consequence.

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which principle of cryptography ensures that a message can only be read by the intended recipient?

Integrity

Confidentiality

Availability

Non-repudiation

Answer explanation

Confidentiality is the principle that ensures only the intended recipient can read a message, protecting it from unauthorized access. This is crucial for secure communication.

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which cryptographic method uses the same key for both encryption and decryption?

Asymmetric encryption

Symmetric encryption

Hashing

Digital signatures

Answer explanation

Symmetric encryption uses the same key for both encryption and decryption, making it efficient for secure data transmission. In contrast, asymmetric encryption uses a pair of keys, and hashing is a one-way function, not for encryption.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?