
AP CK CyberSecurity Unit 3
Authored by Kristina Rice
Information Technology (IT)
12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following technical controls can be used to verify the integrity of a file?
DLP software
Network firewall
Cryptographic file hash
Symmetric encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A high school teacher has access to their students’ standardized test scores. While emailing a parent, the teacher accidentally attaches an entire class’s test scores to the email.
The IT department at the school has specialized software installed that recognized and stopped the confidential test score files from being transmitted.
What type of specialized software prevented the email transmission?
DLP software
Anti-malware software
IDS software
Access control software
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes the length of a cryptographic hash function output?
The length of the hash varies depending on the size of the file
The length of the hash is the same length as the input
The length of the hash is a fixed length
The length of the hash is determined by the encryption key
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A software development company has released a new version of their most popular application. They published the application on their website along with the following cryptographic hash of the file.
U5FNWtVlOim7oaMGds6y
A user downloads and hashes the application using the same cryptographic hashing algorithm as the software development company. The result is the following hash.
U5FNWtVlOim7oaMGds6y
What is the purpose of checking the file hash as described?
To verify that the file size is correct
To confirm that the file has not been tampered with
To check that the file is compatible with their operating system
To ensure that the file was only downloaded from the company’s website
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a shift cipher with a shift of 5 to send a word to a friend. '“CYBER” is the word you want to send to your friend. What message should you send?
PLORE
CBRYE
HYPER
HDGJW
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Person A wants to send a message to Person B using a pre-defined key.
Person A will send ciphertext to Person B
Person B will be able to decrypt the message using the same key that encrypted it.
What is the appropriate cryptographic algorithm for this situation?
Symmetric encryption
Asymmetric encryption
Cryptographic hash function
Public key encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one effect of using a long encryption key?
It speeds up the encryption process
It makes it harder for an adversary to guess the correct key
It reduces the size of the encrypted data
It ensures the data is more compressed
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
13 questions
Generative AI
Quiz
•
12th Grade
10 questions
Ultrasonic Sensor - L1
Quiz
•
6th Grade - University
15 questions
S2 Microsoft Access Database Quiz
Quiz
•
10th Grade - University
10 questions
MIL- Media Info Sources -DALTON
Quiz
•
12th Grade
11 questions
G 10- Understanding Main Memory and Cache
Quiz
•
10th Grade - University
14 questions
Digital Audio and Video
Quiz
•
9th - 12th Grade
10 questions
Network secutiry
Quiz
•
9th Grade - University
10 questions
IT Quiz
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
15 questions
Making Inferences
Quiz
•
7th - 12th Grade
23 questions
TSI Math Vocabulary
Quiz
•
10th - 12th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
20 questions
SSS/SAS
Quiz
•
9th - 12th Grade
20 questions
Predicting Products
Quiz
•
9th - 12th Grade
20 questions
Presidents Day challenge
Quiz
•
9th - 12th Grade
20 questions
Food Chains and Food Webs
Quiz
•
7th - 12th Grade
20 questions
Banking
Quiz
•
9th - 12th Grade