CSF Practice 3 - Chapter 4

CSF Practice 3 - Chapter 4

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

TSIP and Me: What I Know About Technology Standards

TSIP and Me: What I Know About Technology Standards

9th - 12th Grade

20 Qs

Unit 2 Quiz #1

Unit 2 Quiz #1

12th Grade

20 Qs

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

Messer Questions 76 -100

Messer Questions 76 -100

9th Grade

25 Qs

Incident Respond Quiz

Incident Respond Quiz

11th Grade

20 Qs

D.M.B.K's quizzez

D.M.B.K's quizzez

11th - 12th Grade

20 Qs

Cybersecurity MidTerm Exam

Cybersecurity MidTerm Exam

9th - 12th Grade

25 Qs

System Administration

System Administration

10th Grade

22 Qs

CSF Practice 3 - Chapter 4

CSF Practice 3 - Chapter 4

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Medium

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Provide ONE method of creating ciphertext

2.

OPEN ENDED QUESTION

3 mins • 1 pt

List TWO types of encryption algorithm and provide ONE encryption standard for each class.

Evaluate responses using AI:

OFF

Answer explanation

Symmetric

Any 1 example below,

• Triple Digital Encryption Standard / 3DES

• International Data Encryption Algorithm / IDEA

• Advanced Encryption Standard / AES

Asymmetric

Any 1 example below

• Rivest_Shamir-Adleman / RSA

• Diffie-Hellman

• ElGamal

• Elliptic Curve Cryptography / ECC

3.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

A product consultant had recommended to his team an algorithm that is used in New Technology File System (NTFS). The U.S. government uses the same algorithm to protect classified information.Identify the algorithm recommended by the product consultant.

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

A product consultant had recommended to his team an algorithm that is used in New Technology File System (NTFS). The U.S. government uses the same algorithm to protect classified information. Name the type of encryption used for the algorithm.

5.

OPEN ENDED QUESTION

3 mins • 1 pt

A product consultant had recommended to his team an algorithm that is used in New Technology File System (NTFS). The U.S. government uses the same algorithm to protect classified information. Describe the encryption that you have named

Evaluate responses using AI:

OFF

Answer explanation

use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.

Both the sender and receiver know the pre-shared key before any encrypted communication begins.

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

List TWO types of encryption algorithm

7.

OPEN ENDED QUESTION

3 mins • 1 pt

State THREE differences between Symmetric and Asymmetric algorithm.

Evaluate responses using AI:

OFF

Answer explanation

Symmetric:

more efficient, handle more/larger data

more problematic

harder to manage

Asymmetric:

More efficient, small amount data

More secure

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?