
F6-CS Security MCQ

Quiz
•
Computers
•
12th Grade
•
Easy
Adrien Ebitner
Used 2+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is meant by the term cipher when used in cryptography?
A an encryption or decryption algorithm
B an encrypted message
C a type of session key
D a digital signature
E text following an encryption algorithm
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When carrying out asymmetric encryption, which of the following users would keep the private key?
A the sender
B the receiver
C both sender and receiver
D all recipients of the message
E none of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cryptography, which of the following is the term used to describe the message before it is encrypted?
A simpletext
B plaintext
C notext
D ciphertext
E firsttext
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the biggest disadvantage of using symmetric encryption?
A it is very complex and time consuming
B it is rarely used any more
C the value of the key reads the same in both directions
D it only works on computers with older operating systems
E there is a security problem when transmitting the secret key
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the correct name for a form of encryption in which both the sender and the recipient use the same key to encrypt/ decrypt?
A symmetric key encryption
B asymmetric key encryption
C public key encryption
D same key encryption
E block cipher encryption
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is involved in temporary key generation?
A session keys
B private key and certificate
C public key and certificate
D master keys
E public keys
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a correct statement about PKIs?
A they use private and public keys but not digital certificates
B they use digital signatures and public keys 42317.4 Digital signatures and digital certificates
C they are a combination of digital certificates, public key cryptography and CAs
D they use asymmetric keys, hashing algorithms and certificate authorities
E they are a combination of digests, hashing algorithms and asymmetric cryptographic algorithms
Create a free account and access millions of resources
Similar Resources on Wayground
12 questions
Cybersecurity 1

Quiz
•
5th Grade - University
10 questions
Data 231-240

Quiz
•
12th Grade
11 questions
recap DIN h446

Quiz
•
12th Grade
10 questions
Technical Terms - Internet (A-Z) - VCI

Quiz
•
12th Grade
8 questions
WJEC ICT - Chapter 2 - The Internet: Packets & Routing

Quiz
•
10th Grade - University
14 questions
Mobile Devices

Quiz
•
9th - 12th Grade
15 questions
012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

Quiz
•
12th Grade - University
15 questions
Cryptology

Quiz
•
9th Grade - University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade