Search Header Logo

Lecture Review Questions

Authored by Asma Usman

Other

12th Grade

Used 1+ times

Lecture Review Questions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an effective way to prevent phishing attacks?

Implement strong password policies.

Conduct regular staff training sessions.

Answer explanation

To address a phishing email, do not click on any links or download attachments. Report the email to your IT department or email provider, and delete it to prevent any potential security risks.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is a common solution for a data breach?

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the method used to transform 'hello' into 'ifmmp'?

Caesar cipher with a shift of 1

Reverse the string

Substitute vowels with the next vowel

Convert to uppercase

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the decrypted message of: “Tb xob ibxokf dqlox qeb Zvbybo pbzrofpq”?

To win against defeat the Warrior champion

To see beyond reach the Horizon explorer

To fly above clouds the Eagle adventurer

To run faster than the Cheetah sprinter

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is a potential issue with Asymmetric encryption when you receive files from another party, even if you have the decryption key?

The files may be corrupted during transmission.

The files may not be authentic or from a trusted source.

The decryption key may not work with the files.

The files may be too large to decrypt.

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Why would Sophia want to irreversibly encrypt her personal data, I hear you say?!

To ensure data cannot be decrypted

To allow easy data recovery

To make data accessible to everyone

To reduce data storage size

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

"Hashing and Encryption are both essentially the same thing as they turn plain text into an unreadable format". Explain what is wrong with this statement.

Hashing and encryption are the same because both convert data into unreadable formats.

Hashing is a one-way function and cannot be reversed, while encryption is reversible.

Both hashing and encryption are used for data integrity.

Hashing and encryption use the same algorithms.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?