AP CK CyberSecurity Unit 3
Quiz
•
Information Technology (IT)
•
12th Grade
•
Easy
Kristina Rice
Used 3+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following technical controls can be used to verify the integrity of a file?
DLP software
Network firewall
Cryptographic file hash
Symmetric encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A high school teacher has access to their students’ standardized test scores. While emailing a parent, the teacher accidentally attaches an entire class’s test scores to the email.
The IT department at the school has specialized software installed that recognized and stopped the confidential test score files from being transmitted.
What type of specialized software prevented the email transmission?
DLP software
Anti-malware software
IDS software
Access control software
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes the length of a cryptographic hash function output?
The length of the hash varies depending on the size of the file
The length of the hash is the same length as the input
The length of the hash is a fixed length
The length of the hash is determined by the encryption key
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A software development company has released a new version of their most popular application. They published the application on their website along with the following cryptographic hash of the file.
U5FNWtVlOim7oaMGds6y
A user downloads and hashes the application using the same cryptographic hashing algorithm as the software development company. The result is the following hash.
U5FNWtVlOim7oaMGds6y
What is the purpose of checking the file hash as described?
To verify that the file size is correct
To confirm that the file has not been tampered with
To check that the file is compatible with their operating system
To ensure that the file was only downloaded from the company’s website
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a shift cipher with a shift of 5 to send a word to a friend. '“CYBER” is the word you want to send to your friend. What message should you send?
PLORE
CBRYE
HYPER
HDGJW
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Person A wants to send a message to Person B using a pre-defined key.
Person A will send ciphertext to Person B
Person B will be able to decrypt the message using the same key that encrypted it.
What is the appropriate cryptographic algorithm for this situation?
Symmetric encryption
Asymmetric encryption
Cryptographic hash function
Public key encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one effect of using a long encryption key?
It speeds up the encryption process
It makes it harder for an adversary to guess the correct key
It reduces the size of the encrypted data
It ensures the data is more compressed
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
15 questions
Pensamento Computacional
Quiz
•
12th Grade
15 questions
ViewSonic LCD Training
Quiz
•
12th Grade - University
15 questions
TSC Information Security Awareness Campaign 2024
Quiz
•
12th Grade
15 questions
Interactive Multimedia
Quiz
•
12th Grade - University
10 questions
Written Work 4 (.NET Technology)
Quiz
•
12th Grade
10 questions
Understanding User Interfaces and Programming
Quiz
•
9th Grade - University
13 questions
Exploring Computer Network Models
Quiz
•
10th Grade - University
15 questions
Mobile Devices and Networking Concepts Quiz
Quiz
•
12th Grade
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
Discover more resources for Information Technology (IT)
20 questions
Halloween movies trivia
Quiz
•
7th - 12th Grade
15 questions
Halloween Characters
Quiz
•
7th - 12th Grade
10 questions
Halloween Movies Trivia
Quiz
•
5th Grade - University
11 questions
Halloween Trivia #2
Quiz
•
12th Grade
14 questions
Halloween Fun
Quiz
•
2nd - 12th Grade
8 questions
Veterans Day Quiz
Quiz
•
12th Grade
28 questions
Ser vs estar
Quiz
•
9th - 12th Grade
21 questions
Halloween & Math
Quiz
•
8th - 12th Grade
