
Security

Quiz
•
Computers
•
1st - 3rd Grade
•
Medium
Susilawati Rahim
Used 3+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
What is meant by the term cipher when used in cryptography?
an encryption or decryption algorithm
an encrypted message
a type of session key
a digital signature
text following an encryption algorithm
2.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
When carrying out asymmetric encryption, which of the following users would keep the
private key?
the sender
the receiver
both sender and receiver
all recipients of the message
none of the above
3.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
In cryptography, which of the following is the term used to describe the message before it
is encrypted?
simpletext
plaintext
notext
ciphertext
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following is the biggest disadvantage of using symmetric encryption?
it is very complex and time consuming
it is rarely used any more
the value of the key reads the same in both directions
it only works on computers with older operating systems
there is a security problem when transmitting the secret key
5.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Which of the following is the correct name for a form of encryption in which both the
sender and the recipient use the same key to encrypt/decrypt?
symmetric key encryption
asymmetric key encryption
public key encryption
same key encryption
block cipher encryption
6.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Which of the following is involved in temporary key generation?
session keys
private key and certificate
public key and certificate
master keys
public keys
7.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Which of the following is a correct statement about PKIs?
they use private and public keys but not digital certificates
they use digital signatures and public keys
they are a combination of digital certificates, public key cryptography and CAs
they use asymmetric keys, hashing algorithms and certificate authorities
they are a combination of digests, hashing algorithms and asymmetric cryptographic
algorithms
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
keys and keyboard

Quiz
•
1st Grade
10 questions
Keyboarding: The Home Row

Quiz
•
3rd - 5th Grade
10 questions
G1-W10-The Keyboard

Quiz
•
1st Grade
10 questions
Shortcut keys

Quiz
•
1st - 2nd Grade
10 questions
Parts of computer

Quiz
•
KG - 2nd Grade
12 questions
Recapitulation ICT Quiz

Quiz
•
1st Grade
13 questions
Online Safety

Quiz
•
3rd - 5th Grade
10 questions
ICT-3rd Grading

Quiz
•
2nd Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
13 questions
Subject Verb Agreement

Quiz
•
3rd Grade
15 questions
Plural Nouns

Quiz
•
3rd Grade
10 questions
Place Value

Quiz
•
3rd Grade
17 questions
Multiplication facts

Quiz
•
3rd Grade
20 questions
Irregular Plural Nouns

Quiz
•
3rd Grade
20 questions
Subject and Predicate Review

Quiz
•
3rd Grade
20 questions
Division Facts

Quiz
•
3rd Grade
12 questions
Map Skills

Quiz
•
3rd Grade