F6-CS Security MCQ

F6-CS Security MCQ

12th Grade

10 Qs

quiz-placeholder

Similar activities

Cryptography Quiz

Cryptography Quiz

7th Grade - University

11 Qs

Technical Terms - Internet (A-Z) - HTTPS

Technical Terms - Internet (A-Z) - HTTPS

12th Grade

10 Qs

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

13 Qs

Public Key Encryption

Public Key Encryption

7th - 12th Grade

10 Qs

AP CSP BI 5

AP CSP BI 5

9th - 12th Grade

9 Qs

Cyber Security

Cyber Security

9th - 12th Grade

10 Qs

Understanding Data Transformation Techniques

Understanding Data Transformation Techniques

12th Grade - University

10 Qs

A Level- Security

A Level- Security

11th - 12th Grade

10 Qs

F6-CS Security MCQ

F6-CS Security MCQ

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Adrien Ebitner

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term cipher when used in cryptography?

A an encryption or decryption algorithm

B an encrypted message

C a type of session key

D a digital signature

E text following an encryption algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When carrying out asymmetric encryption, which of the following users would keep the private key?

A the sender

B the receiver

C both sender and receiver

D all recipients of the message

E none of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, which of the following is the term used to describe the message before it is encrypted?

A simpletext

B plaintext

C notext

D ciphertext

E firsttext

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the biggest disadvantage of using symmetric encryption?

A it is very complex and time consuming

B it is rarely used any more

C the value of the key reads the same in both directions

D it only works on computers with older operating systems

E there is a security problem when transmitting the secret key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the correct name for a form of encryption in which both the sender and the recipient use the same key to encrypt/ decrypt?

A symmetric key encryption

B asymmetric key encryption

C public key encryption

D same key encryption

E block cipher encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is involved in temporary key generation?

A session keys

B private key and certificate

C public key and certificate

D master keys

E public keys

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a correct statement about PKIs?

A they use private and public keys but not digital certificates

B they use digital signatures and public keys 42317.4 Digital signatures and digital certificates

C they are a combination of digital certificates, public key cryptography and CAs

D they use asymmetric keys, hashing algorithms and certificate authorities

E they are a combination of digests, hashing algorithms and asymmetric cryptographic algorithms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?