F6-CS Security MCQ

F6-CS Security MCQ

12th Grade

10 Qs

quiz-placeholder

Similar activities

Five Nights At Freddy's: Security Breach Quiz

Five Nights At Freddy's: Security Breach Quiz

KG - Professional Development

13 Qs

Access - Lesson 14

Access - Lesson 14

9th - 12th Grade

10 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Wee Word Intro

Wee Word Intro

7th - 12th Grade

12 Qs

Know thy Peer-to-Peer

Know thy Peer-to-Peer

12th Grade

10 Qs

TCP/IP & other protocols [A Level]

TCP/IP & other protocols [A Level]

12th Grade

14 Qs

Abhyudaya coding class -  Grade 7

Abhyudaya coding class - Grade 7

6th Grade - University

10 Qs

MIL March 8, 2023

MIL March 8, 2023

12th Grade

10 Qs

F6-CS Security MCQ

F6-CS Security MCQ

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Adrien Ebitner

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term cipher when used in cryptography?

A an encryption or decryption algorithm

B an encrypted message

C a type of session key

D a digital signature

E text following an encryption algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When carrying out asymmetric encryption, which of the following users would keep the private key?

A the sender

B the receiver

C both sender and receiver

D all recipients of the message

E none of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, which of the following is the term used to describe the message before it is encrypted?

A simpletext

B plaintext

C notext

D ciphertext

E firsttext

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the biggest disadvantage of using symmetric encryption?

A it is very complex and time consuming

B it is rarely used any more

C the value of the key reads the same in both directions

D it only works on computers with older operating systems

E there is a security problem when transmitting the secret key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the correct name for a form of encryption in which both the sender and the recipient use the same key to encrypt/ decrypt?

A symmetric key encryption

B asymmetric key encryption

C public key encryption

D same key encryption

E block cipher encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is involved in temporary key generation?

A session keys

B private key and certificate

C public key and certificate

D master keys

E public keys

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a correct statement about PKIs?

A they use private and public keys but not digital certificates

B they use digital signatures and public keys 42317.4 Digital signatures and digital certificates

C they are a combination of digital certificates, public key cryptography and CAs

D they use asymmetric keys, hashing algorithms and certificate authorities

E they are a combination of digests, hashing algorithms and asymmetric cryptographic algorithms

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?