AP CK CyberSecurity Unit 3

AP CK CyberSecurity Unit 3

12th Grade

10 Qs

quiz-placeholder

Similar activities

Binary, Decimal, Hexadecimal Knowledge

Binary, Decimal, Hexadecimal Knowledge

7th Grade - University

9 Qs

Business Analytics Quiz

Business Analytics Quiz

12th Grade

10 Qs

Cyber Security Awreness

Cyber Security Awreness

9th - 12th Grade

15 Qs

Innovation and Business Concepts

Innovation and Business Concepts

12th Grade

14 Qs

Animation Techniques Quiz

Animation Techniques Quiz

10th Grade - University

10 Qs

people media

people media

12th Grade

10 Qs

Digital Literacy Quiz

Digital Literacy Quiz

7th - 12th Grade

10 Qs

SSC Summer Camp Post-Quiz

SSC Summer Camp Post-Quiz

9th - 12th Grade

10 Qs

AP CK CyberSecurity Unit 3

AP CK CyberSecurity Unit 3

Assessment

Quiz

Information Technology (IT)

12th Grade

Easy

Created by

Kristina Rice

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technical controls can be used to verify the integrity of a file?

DLP software

Network firewall

Cryptographic file hash

Symmetric encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A high school teacher has access to their students’ standardized test scores. While emailing a parent, the teacher accidentally attaches an entire class’s test scores to the email.

The IT department at the school has specialized software installed that recognized and stopped the confidential test score files from being transmitted.

What type of specialized software prevented the email transmission?

DLP software

Anti-malware software

IDS software

Access control software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes the length of a cryptographic hash function output?

The length of the hash varies depending on the size of the file

The length of the hash is the same length as the input

The length of the hash is a fixed length

The length of the hash is determined by the encryption key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software development company has released a new version of their most popular application. They published the application on their website along with the following cryptographic hash of the file.

U5FNWtVlOim7oaMGds6y

A user downloads and hashes the application using the same cryptographic hashing algorithm as the software development company. The result is the following hash.

U5FNWtVlOim7oaMGds6y

What is the purpose of checking the file hash as described?

To verify that the file size is correct

To confirm that the file has not been tampered with

To check that the file is compatible with their operating system

To ensure that the file was only downloaded from the company’s website

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are using a shift cipher with a shift of 5 to send a word to a friend. '“CYBER” is the word you want to send to your friend. What message should you send?

PLORE

CBRYE

HYPER

HDGJW

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Person A wants to send a message to Person B using a pre-defined key.

Person A will send ciphertext to Person B

Person B will be able to decrypt the message using the same key that encrypted it.

What is the appropriate cryptographic algorithm for this situation?

Symmetric encryption

Asymmetric encryption

Cryptographic hash function

Public key encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one effect of using a long encryption key?

It speeds up the encryption process

It makes it harder for an adversary to guess the correct key

It reduces the size of the encrypted data

It ensures the data is more compressed

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?