Search Header Logo

APCSP IOC-2.B Cybersecurity and Encryption

Authored by Beckie Lee

Computers

9th - 12th Grade

Used 9+ times

APCSP IOC-2.B Cybersecurity and Encryption
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of implementing authentication measures like strong passwords and MFA?

To speed up device performance.

To protect devices and information from unauthorized access.

To encrypt data during transmission.

To ensure regular software updates are installed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following passwords best fits the description of a "strong password" (easy for the user to remember, difficult for others to guess based on knowledge of the user)?

password123

The user's own street name (mapleStreet)

A random string like X7$gP@!zQw (potentially hard for the user to remember)

An unusual phrase known only to the user like 3PurpleElephantsFly@Midnight!

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multifactor Authentication (MFA) requires evidence from typically at least two of three categories. Which of the following correctly lists these three categories?

Knowledge (know), Possession (have), Inherence (are)

Location (where), Time (when), Action (do)

Public Key (encrypt), Private Key (decrypt), Symmetric Key (both)

Hardware (physical), Software (program), Network (connection)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user logs into their bank account by entering a password and then entering a code sent to their registered mobile phone. How does this process align with the definition of MFA?

It uses only one factor (knowledge - the password).

It successfully uses two factors: knowledge (password) and possession (phone).

It uses two factors: knowledge (password) and inherence (fingerprint).

It is not MFA because it only involves two steps.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does Multifactor Authentication enhance security compared to using only a strong password?

It makes the password itself harder to guess.

It encrypts the password during transmission.

It adds at least one additional layer of security that must be compromised.

It automatically updates the user's password regularly.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the fundamental difference between encryption and decryption?

Encryption encodes data to prevent unauthorized access; decryption decodes it.

Encryption uses public keys; decryption uses private keys.

Encryption protects data at rest; decryption protects data in transit.

Encryption requires MFA; decryption does not.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In symmetric key encryption, how many keys are required for secure communication between two parties (Alice and Bob)?

One shared key used by both Alice and Bob.

Two keys: Alice's public key and Bob's private key.

Two keys: Alice's private key and Bob's public key.

Four keys: A public/private pair for Alice and a public/private pair for Bob.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?