
Unit 4 Test
Quiz
•
Computers
•
11th Grade
•
Practice Problem
•
Easy
Victoria Berkowitz
Used 3+ times
FREE Resource
Enhance your content in a minute
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A financial services company needs to send sensitive transaction details to a partner organization. To ensure confidentiality, they decide to use encryption. The key used to encrypt the data is different from the one used to decrypt it. What type of encryption are they using?
Hashing
Symmetric encryption
Asymmetric encryption
Obfuscation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An application development team is tasked with releasing a software tool to the public but wants to protect proprietary algorithms within the code. They modify the source code to make it harder to interpret. Which technique are they using?
A) Encryption
B) Tokenization
C) Obfuscation
D) Hashing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A journalist wants to send sensitive information hidden inside an image to a whistleblower. Which technique can they use to conceal the information without encrypting it?
A) Encryption
B) Steganography
C) Obfuscation
D) Hashing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of steganography?
To encrypt data using complex keys
To mask sensitive data in a database
To hide data within other files or media
To generate unique hashes for file integrity
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A healthcare organization processes sensitive patient data. Instead of storing Social Security numbers directly, they replace them with unique identifiers that have no mathematical relationship to the original data. What method is this?
Data masking
Tokenization
Encryption
Salting
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During software testing, a company replaces actual customer account numbers with fake but realistic-looking account numbers in their test environment. What technique are they using?
Data masking
Tokenization
Obfuscation
Hashing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An IT administrator needs to verify that a downloaded software file has not been tampered with. They compare a unique string provided by the software vendor with the one generated from the downloaded file. What method are they using?
Symmetric encryption
Hashing
Salting
Obfuscation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Google Sheet Formulas Functions
Quiz
•
11th - 12th Grade
20 questions
El Computador
Quiz
•
5th - 11th Grade
20 questions
Quiz Inf X.B
Quiz
•
10th Grade - University
20 questions
Remidi XI TKJ2 UH 2 Teknologi Jaringan WAN
Quiz
•
11th Grade
20 questions
Dampak Sosial Informatika
Quiz
•
9th - 12th Grade
20 questions
Python Recap
Quiz
•
7th Grade - University
20 questions
Toán tử trong C ++
Quiz
•
10th - 12th Grade
20 questions
Ôn tập học kỳ I
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
