
Unit 4 Test

Quiz
•
Computers
•
11th Grade
•
Easy

Victoria Berkowitz
Used 3+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A financial services company needs to send sensitive transaction details to a partner organization. To ensure confidentiality, they decide to use encryption. The key used to encrypt the data is different from the one used to decrypt it. What type of encryption are they using?
Hashing
Symmetric encryption
Asymmetric encryption
Obfuscation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An application development team is tasked with releasing a software tool to the public but wants to protect proprietary algorithms within the code. They modify the source code to make it harder to interpret. Which technique are they using?
A) Encryption
B) Tokenization
C) Obfuscation
D) Hashing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A journalist wants to send sensitive information hidden inside an image to a whistleblower. Which technique can they use to conceal the information without encrypting it?
A) Encryption
B) Steganography
C) Obfuscation
D) Hashing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of steganography?
To encrypt data using complex keys
To mask sensitive data in a database
To hide data within other files or media
To generate unique hashes for file integrity
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A healthcare organization processes sensitive patient data. Instead of storing Social Security numbers directly, they replace them with unique identifiers that have no mathematical relationship to the original data. What method is this?
Data masking
Tokenization
Encryption
Salting
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During software testing, a company replaces actual customer account numbers with fake but realistic-looking account numbers in their test environment. What technique are they using?
Data masking
Tokenization
Obfuscation
Hashing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An IT administrator needs to verify that a downloaded software file has not been tampered with. They compare a unique string provided by the software vendor with the one generated from the downloaded file. What method are they using?
Symmetric encryption
Hashing
Salting
Obfuscation
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
8.4 Protection of data

Quiz
•
9th - 12th Grade
22 questions
Cyber Quiz: Lessons 6.4-6.5

Quiz
•
11th Grade
21 questions
CSP Vocab Practice 2

Quiz
•
10th - 12th Grade
20 questions
APCSP IOC-2.B Cybersecurity and Encryption

Quiz
•
9th - 12th Grade
23 questions
5.2 Requesting and retrieving web pages

Quiz
•
9th Grade - University
24 questions
Cyber Authentication Methods Quiz

Quiz
•
11th Grade
21 questions
Security & Authentication in ITGS

Quiz
•
10th - 12th Grade
20 questions
Threats, Issues, and Defenses - Ch 5

Quiz
•
10th Grade - University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
Discover more resources for Computers
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
40 questions
LSHS Student Handbook Review: Pages 7-9

Quiz
•
11th Grade
20 questions
Scalars, Vectors & Graphs

Quiz
•
11th Grade
62 questions
Spanish Speaking Countries, Capitals, and Locations

Quiz
•
9th - 12th Grade
10 questions
Solving Equations Opener

Quiz
•
11th Grade
20 questions
First Day of School

Quiz
•
6th - 12th Grade
21 questions
Arithmetic Sequences

Quiz
•
9th - 12th Grade