Security

Security

1st - 3rd Grade

10 Qs

quiz-placeholder

Similar activities

Keys on the Keyboard

Keys on the Keyboard

3rd - 12th Grade

12 Qs

Grade-3-The Keyboard

Grade-3-The Keyboard

3rd Grade

10 Qs

Staying Safe Online

Staying Safe Online

1st - 3rd Grade

11 Qs

Basic Keyboarding

Basic Keyboarding

KG - 6th Grade

12 Qs

Special Keys

Special Keys

2nd Grade

10 Qs

Protocols 1

Protocols 1

1st Grade

15 Qs

Computer keyboard

Computer keyboard

KG - 3rd Grade

15 Qs

KEYBOARD KEYS

KEYBOARD KEYS

KG - 1st Grade

11 Qs

Security

Security

Assessment

Quiz

Computers

1st - 3rd Grade

Medium

Created by

Susilawati Rahim

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

What is meant by the term cipher when used in cryptography?

an encryption or decryption algorithm

an encrypted message

a type of session key

a digital signature

text following an encryption algorithm

2.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

When carrying out asymmetric encryption, which of the following users would keep the

private key?

the sender

the receiver

both sender and receiver

all recipients of the message

none of the above

3.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

In cryptography, which of the following is the term used to describe the message before it

is encrypted?

simpletext

plaintext

notext

ciphertext

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the biggest disadvantage of using symmetric encryption?

it is very complex and time consuming

it is rarely used any more

the value of the key reads the same in both directions

it only works on computers with older operating systems

there is a security problem when transmitting the secret key

5.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following is the correct name for a form of encryption in which both the

sender and the recipient use the same key to encrypt/decrypt?

symmetric key encryption

asymmetric key encryption

public key encryption

same key encryption

block cipher encryption

6.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following is involved in temporary key generation?

session keys

private key and certificate

public key and certificate

master keys

public keys

7.

MULTIPLE CHOICE QUESTION

20 sec • 5 pts

Which of the following is a correct statement about PKIs?

they use private and public keys but not digital certificates

they use digital signatures and public keys

they are a combination of digital certificates, public key cryptography and CAs

they use asymmetric keys, hashing algorithms and certificate authorities

they are a combination of digests, hashing algorithms and asymmetric cryptographic

algorithms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?