AP CK CyberSecurity Unit 3

Quiz
•
Information Technology (IT)
•
12th Grade
•
Easy
Kristina Rice
Used 3+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following technical controls can be used to verify the integrity of a file?
DLP software
Network firewall
Cryptographic file hash
Symmetric encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A high school teacher has access to their students’ standardized test scores. While emailing a parent, the teacher accidentally attaches an entire class’s test scores to the email.
The IT department at the school has specialized software installed that recognized and stopped the confidential test score files from being transmitted.
What type of specialized software prevented the email transmission?
DLP software
Anti-malware software
IDS software
Access control software
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes the length of a cryptographic hash function output?
The length of the hash varies depending on the size of the file
The length of the hash is the same length as the input
The length of the hash is a fixed length
The length of the hash is determined by the encryption key
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A software development company has released a new version of their most popular application. They published the application on their website along with the following cryptographic hash of the file.
U5FNWtVlOim7oaMGds6y
A user downloads and hashes the application using the same cryptographic hashing algorithm as the software development company. The result is the following hash.
U5FNWtVlOim7oaMGds6y
What is the purpose of checking the file hash as described?
To verify that the file size is correct
To confirm that the file has not been tampered with
To check that the file is compatible with their operating system
To ensure that the file was only downloaded from the company’s website
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a shift cipher with a shift of 5 to send a word to a friend. '“CYBER” is the word you want to send to your friend. What message should you send?
PLORE
CBRYE
HYPER
HDGJW
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Person A wants to send a message to Person B using a pre-defined key.
Person A will send ciphertext to Person B
Person B will be able to decrypt the message using the same key that encrypted it.
What is the appropriate cryptographic algorithm for this situation?
Symmetric encryption
Asymmetric encryption
Cryptographic hash function
Public key encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one effect of using a long encryption key?
It speeds up the encryption process
It makes it harder for an adversary to guess the correct key
It reduces the size of the encrypted data
It ensures the data is more compressed
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
uji coba Strategi Algoritma dan Pemrograman

Quiz
•
11th Grade - University
10 questions
Criptografía y Seguridad Digital

Quiz
•
10th Grade - University
10 questions
AP CK CyberSecurity Unit 4

Quiz
•
12th Grade
15 questions
Data Encryption Standards Quiz

Quiz
•
12th Grade
11 questions
Compiler Design Concepts Quiz

Quiz
•
12th Grade
11 questions
Information Security Management Ch 8

Quiz
•
12th Grade
10 questions
Securing Information Systems - Chapter 10

Quiz
•
12th Grade
15 questions
BITS AND BYTES - THE FUTURE OF CYBERSECURITY - SENIOR PRELIM

Quiz
•
12th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade