APCSP IOC-2.B Cybersecurity and Encryption

APCSP IOC-2.B Cybersecurity and Encryption

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

S1 Computer Systems

S1 Computer Systems

9th Grade

20 Qs

APCSP Big Idea 4

APCSP Big Idea 4

12th Grade

20 Qs

AP CSP Unit 4 Ch 1 Vocab

AP CSP Unit 4 Ch 1 Vocab

9th - 12th Grade

19 Qs

Chapter 2 Utility Software

Chapter 2 Utility Software

12th Grade

20 Qs

Utility Software

Utility Software

KG - University

22 Qs

Impacts of Computing

Impacts of Computing

9th - 12th Grade

15 Qs

ITGS CHAPTER 1 TO CHAPTER 5

ITGS CHAPTER 1 TO CHAPTER 5

11th - 12th Grade

20 Qs

1.5 Systems Software

1.5 Systems Software

9th - 11th Grade

18 Qs

APCSP IOC-2.B Cybersecurity and Encryption

APCSP IOC-2.B Cybersecurity and Encryption

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Beckie Lee

Used 9+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of implementing authentication measures like strong passwords and MFA?

To speed up device performance.

To protect devices and information from unauthorized access.

To encrypt data during transmission.

To ensure regular software updates are installed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following passwords best fits the description of a "strong password" (easy for the user to remember, difficult for others to guess based on knowledge of the user)?

password123

The user's own street name (mapleStreet)

A random string like X7$gP@!zQw (potentially hard for the user to remember)

An unusual phrase known only to the user like 3PurpleElephantsFly@Midnight!

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multifactor Authentication (MFA) requires evidence from typically at least two of three categories. Which of the following correctly lists these three categories?

Knowledge (know), Possession (have), Inherence (are)

Location (where), Time (when), Action (do)

Public Key (encrypt), Private Key (decrypt), Symmetric Key (both)

Hardware (physical), Software (program), Network (connection)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user logs into their bank account by entering a password and then entering a code sent to their registered mobile phone. How does this process align with the definition of MFA?

It uses only one factor (knowledge - the password).

It successfully uses two factors: knowledge (password) and possession (phone).

It uses two factors: knowledge (password) and inherence (fingerprint).

It is not MFA because it only involves two steps.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does Multifactor Authentication enhance security compared to using only a strong password?

It makes the password itself harder to guess.

It encrypts the password during transmission.

It adds at least one additional layer of security that must be compromised.

It automatically updates the user's password regularly.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the fundamental difference between encryption and decryption?

Encryption encodes data to prevent unauthorized access; decryption decodes it.

Encryption uses public keys; decryption uses private keys.

Encryption protects data at rest; decryption protects data in transit.

Encryption requires MFA; decryption does not.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In symmetric key encryption, how many keys are required for secure communication between two parties (Alice and Bob)?

One shared key used by both Alice and Bob.

Two keys: Alice's public key and Bob's private key.

Two keys: Alice's private key and Bob's public key.

Four keys: A public/private pair for Alice and a public/private pair for Bob.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?