Module 3 Quiz (Cybersecurity)
Quiz
•
Information Technology (IT)
•
10th Grade
•
Practice Problem
•
Hard
Angela May
Used 1+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are the key security objectives of cryptography? (Select all that apply)
Integrity
Authentication
Non-repudiation
Confidentiality
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If you use the Caesar cipher to encrypt the phrase “Data security” using a 5-letter shift, which of the following would be the ciphertext?
Ifyf xjhzwnyd
Gdwd vhfxulwb
Fcvc ugewtkva
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
__________________ is when hackers divert users from legitimate websites by faking the IP address and sending them to a false website with malicious code.
DNS poisoning
DNS spoofing
Censorship
Spyware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or false? Hackers can easily impersonate DNS servers and poison or spoof DNS addresses because it is built on the UDP protocol which does not verify the identity of senders or receivers.
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
__________________ is a computer network authentication protocol that ensures two-way authentication between the client and server over non-secured connections.
Hashing function
Asymmetric key cryptography
Kerberos protocol
Secret key cryptography
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are some of the key features of a digital certificate? (Select all that apply)
It is tamper-resistant
It has an expiry date
It cannot be traced or tracked
It contains identifying information about an entity
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or false? If a device is stolen or if a CA is compromised, it can publish a revocation list of any issued certificates that can no longer be trusted.
True
False
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
15 questions
Ulangan Harian 3
Quiz
•
10th Grade
15 questions
CSS Image Manipulation Quiz
Quiz
•
9th Grade - University
12 questions
Networking Protocols Quiz
Quiz
•
9th - 12th Grade
10 questions
AAVC - Listening Skills Quiz
Quiz
•
10th Grade
15 questions
Lesson 1: System Attacks and External Threats
Quiz
•
9th - 12th Grade
15 questions
CodeHS Cybersecurity-and-You-Quiz
Quiz
•
9th - 12th Grade
12 questions
Pemboleh Ubah, Pemalar dan Jenis Data
Quiz
•
9th - 12th Grade
10 questions
Exercício Aula 1 - Segurança na Internet
Quiz
•
10th Grade - University
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
10 questions
Understanding Meiosis
Interactive video
•
6th - 10th Grade
10 questions
Exploring the Origins of Veterans Day
Interactive video
•
6th - 10th Grade
28 questions
Ser vs estar
Quiz
•
9th - 12th Grade
10 questions
Understanding Protein Synthesis
Interactive video
•
7th - 10th Grade
10 questions
Exploring Newton's Laws of Motion
Interactive video
•
6th - 10th Grade
10 questions
Exploring the Origins of Veterans Day
Interactive video
•
6th - 10th Grade
