CSF - Chapter 4 - 2024

CSF - Chapter 4 - 2024

9th - 12th Grade

39 Qs

quiz-placeholder

Similar activities

IT Webxam Practice Test #1

IT Webxam Practice Test #1

12th Grade

40 Qs

Tech+ 7.3/4

Tech+ 7.3/4

10th Grade

41 Qs

CPT EP Quiz 2 (C1 Computer Architecture, C10 Network Addresses)

CPT EP Quiz 2 (C1 Computer Architecture, C10 Network Addresses)

9th Grade - University

40 Qs

Computer Hardware Quiz

Computer Hardware Quiz

11th Grade

40 Qs

Final Exam in Empowerment Technology

Final Exam in Empowerment Technology

12th Grade

40 Qs

Tech + Module 2: Data and Privacy - pre/post test

Tech + Module 2: Data and Privacy - pre/post test

10th Grade

38 Qs

Understanding Social Engineering Threats

Understanding Social Engineering Threats

11th Grade

40 Qs

BTUI'24 - Inter-school ICT Quiz - Quarter Finals

BTUI'24 - Inter-school ICT Quiz - Quarter Finals

12th Grade - University

40 Qs

CSF - Chapter 4 - 2024

CSF - Chapter 4 - 2024

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Used 1+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

block

hash

stream

elliptical

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

3DES

Vignere

AES

Skipjack

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

asymmetric

hash

symmetric

one-time pad

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

deterrent

detective

preventive

masking

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What term is used to describe the technology that replaces sensitive information with a nonsensitive version?

blanking

=hiding

retracting

whiteout

masking

Answer explanation

Refer to curriculum topic: 4.3.1
Data masking replaces sensitive information with nonsensitive information. After replacement, the nonsensitive version looks and acts like the original.

The correct answer is: masking

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which three processes are examples of logical access controls? (Choose three.)

guards to monitor security screens

swipe cards to allow access to a restricted area

intrusion detection system (IDS) to watch for suspicious network activity

biometrics to validate physical characteristics

firewalls to monitor traffic

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which three protocols use asymmetric key algorithms? (Choose four.)

Internet Key Exchange (IKE)

Secure Socket Layer (SSL)

Secure Shell (SSH)

Pretty Good Privacy (PGP)

Secure File Transfer Protocol (SFTP)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?