CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

8th Grade - Professional Development

21 Qs

quiz-placeholder

Similar activities

Cryptography

Cryptography

Professional Development

17 Qs

Microsoft Stride Threat Taxonomy

Microsoft Stride Threat Taxonomy

12th Grade

18 Qs

Cybersecurity - Review for Exam

Cybersecurity - Review for Exam

9th - 12th Grade

20 Qs

Section 7: Security (6-8)

Section 7: Security (6-8)

University

22 Qs

Network Security Quiz

Network Security Quiz

9th Grade

20 Qs

Fundamentals of Cryptography Quiz

Fundamentals of Cryptography Quiz

Professional Development

20 Qs

Information Security Quiz

Information Security Quiz

University

21 Qs

C A+ U11

C A+ U11

9th Grade

17 Qs

CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

Assessment

Quiz

Computers

8th Grade - Professional Development

Medium

Created by

Zac Lewis

Used 16+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that scans disks and programs for known viruses and eliminates them.

anti-virus software

asymmetric encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An encryption method in which two keys are used to encrypt and decrypt a message.

asymmetric encryption

symmetric encryption

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.

authentication

digital certificate

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of converting encrypted data back to its original form.

decryption

encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A password-protected, encrypted data file containing message encryption, user identification and message text.

digital certificate

asymmetric encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time

digital signature

digital certificate

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.

encryption

firewall

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?