Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

quiz-placeholder

Similar activities

Crypto Vocab

Crypto Vocab

9th - 12th Grade

12 Qs

ITF - Quiz 14.4 - Uses of Encryption

ITF - Quiz 14.4 - Uses of Encryption

Professional Development

15 Qs

1.3.1 - Encryption & Hashing

1.3.1 - Encryption & Hashing

8th - 12th Grade

13 Qs

Cryptography

Cryptography

University

15 Qs

AP CSP Unit 8 Review

AP CSP Unit 8 Review

11th Grade

12 Qs

Cyber Security

Cyber Security

KG - University

10 Qs

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

Encryption and Caesar Cipher Quiz

Encryption and Caesar Cipher Quiz

9th - 12th Grade

15 Qs

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

Assessment

Quiz

Computers

KG - University

Medium

Created by

Marcus Phang

Used 70+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three protocols use asymmetric key algorithms? (Choose three.)

Secure Shell (SSH)

Pretty Good Privacy (PGP)

Secure Sockets Layer (SSL)

Advanced Encryption Standard (AES)

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

WEP

DES

RSA

Diffie-Hellman (DH)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

symmetric

asymmetric

transposition

one-time pad

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three devices represent examples of physical access controls? (Choose three.)

locks

firewalls

swipe cards

video cameras

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

hash

symmetric

asymmetric

one-time pad

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

detective

deterrent

masking

preventive

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?