1.3.1 - Encryption & Hashing

1.3.1 - Encryption & Hashing

8th - 12th Grade

13 Qs

quiz-placeholder

Similar activities

IBA Chapter 8B

IBA Chapter 8B

8th - 12th Grade

16 Qs

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

12th Grade - University

15 Qs

Cryptography

Cryptography

10th Grade

15 Qs

CSP 2.1.5 Secure Protocols

CSP 2.1.5 Secure Protocols

9th - 12th Grade

13 Qs

MySQL

MySQL

12th Grade

10 Qs

Cybersecurity Quiz: Lesson 6.1

Cybersecurity Quiz: Lesson 6.1

11th Grade

16 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

12CSC Database Normalisation

12CSC Database Normalisation

9th - 12th Grade

17 Qs

1.3.1 - Encryption & Hashing

1.3.1 - Encryption & Hashing

Assessment

Quiz

Computers

8th - 12th Grade

Medium

Created by

Alex Holmes

Used 68+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What is encryption?

Data is altered to make it easy to read

Transforms data to make it easier to enable hackers to access it

Transform data from one form into another

Data is altered to prevent people from reading it

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Original data ready to be encrypted is called

Plaintext

Ciphertext

Cipher

Key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encrypted data is called

Plaintext

Ciphertext

Cipher

Key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Algorithms used to encrypt data is called

Plaintext

Ciphertext

Cipher

Key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information to lock or unlock the message is the ...

Plaintext

Ciphertext

Cipher

Key

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Symmetric encryption ..

Uses the same key to encrypt and decrypt data

Is very secure

Is not very secure

Uses different keys to encrypt and decrypt data

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Symmetric encryption ..

Sends out new keys can be sent out each time there is a new message

Interception and duplication of the key can happen

Is not very secure

Uses different keys to encrypt and decrypt data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?