AP CK CyberSecurity Unit 3

AP CK CyberSecurity Unit 3

12th Grade

10 Qs

quiz-placeholder

Similar activities

IT Quiz

IT Quiz

12th Grade

10 Qs

Fundamentals of Cryptography Quiz

Fundamentals of Cryptography Quiz

12th Grade

15 Qs

SSC Summer Camp Pre-Quiz

SSC Summer Camp Pre-Quiz

9th - 12th Grade

10 Qs

Network secutiry

Network secutiry

9th Grade - University

10 Qs

Understanding Security and Encryption

Understanding Security and Encryption

12th Grade

10 Qs

SSC Summer Camp Post-Quiz

SSC Summer Camp Post-Quiz

9th - 12th Grade

10 Qs

Prueba de Seguridad Informática

Prueba de Seguridad Informática

12th Grade

15 Qs

AP CK CyberSecurity Unit 3

AP CK CyberSecurity Unit 3

Assessment

Quiz

Information Technology (IT)

12th Grade

Easy

Created by

Kristina Rice

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technical controls can be used to verify the integrity of a file?

DLP software

Network firewall

Cryptographic file hash

Symmetric encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A high school teacher has access to their students’ standardized test scores. While emailing a parent, the teacher accidentally attaches an entire class’s test scores to the email.

The IT department at the school has specialized software installed that recognized and stopped the confidential test score files from being transmitted.

What type of specialized software prevented the email transmission?

DLP software

Anti-malware software

IDS software

Access control software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes the length of a cryptographic hash function output?

The length of the hash varies depending on the size of the file

The length of the hash is the same length as the input

The length of the hash is a fixed length

The length of the hash is determined by the encryption key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software development company has released a new version of their most popular application. They published the application on their website along with the following cryptographic hash of the file.

U5FNWtVlOim7oaMGds6y

A user downloads and hashes the application using the same cryptographic hashing algorithm as the software development company. The result is the following hash.

U5FNWtVlOim7oaMGds6y

What is the purpose of checking the file hash as described?

To verify that the file size is correct

To confirm that the file has not been tampered with

To check that the file is compatible with their operating system

To ensure that the file was only downloaded from the company’s website

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are using a shift cipher with a shift of 5 to send a word to a friend. '“CYBER” is the word you want to send to your friend. What message should you send?

PLORE

CBRYE

HYPER

HDGJW

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Person A wants to send a message to Person B using a pre-defined key.

Person A will send ciphertext to Person B

Person B will be able to decrypt the message using the same key that encrypted it.

What is the appropriate cryptographic algorithm for this situation?

Symmetric encryption

Asymmetric encryption

Cryptographic hash function

Public key encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one effect of using a long encryption key?

It speeds up the encryption process

It makes it harder for an adversary to guess the correct key

It reduces the size of the encrypted data

It ensures the data is more compressed

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?