Net Quiz 4

Net Quiz 4

11th Grade

17 Qs

quiz-placeholder

Similar activities

Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

9th - 12th Grade

16 Qs

Unit 4 - Review

Unit 4 - Review

9th - 11th Grade

21 Qs

AP CSP_Unit 4 Vocab

AP CSP_Unit 4 Vocab

9th - 12th Grade

20 Qs

Y9 - CS - L01 - Programming Key Terms Quiz

Y9 - CS - L01 - Programming Key Terms Quiz

9th - 12th Grade

12 Qs

Encryption and Caesar Cipher Quiz

Encryption and Caesar Cipher Quiz

9th - 12th Grade

15 Qs

BJC U4L2 Encryption

BJC U4L2 Encryption

9th - 12th Grade

20 Qs

9.24 Introduction to Cybersecurity Practice Test

9.24 Introduction to Cybersecurity Practice Test

11th Grade

13 Qs

Introduction to Cybersecurity Final Exam Units 1-8

Introduction to Cybersecurity Final Exam Units 1-8

9th - 12th Grade

20 Qs

Net Quiz 4

Net Quiz 4

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Geok Soon Sia

Used 1+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

RSA

Diffie-Hellman

WEP

DES

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

transposition

symmetric

asymmetric

one-time pad

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of cipher encrypts plaintext one byte or one bit at a time?

block

stream

hash

enigma

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

ECC

RSA

AES

IDEA

Answer explanation

Elliptic curve cryptography (ECC) uses elliptic curves as part of the algorithm for digital signature generation and key exchange.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the term used to describe the science of making and breaking secret codes?

factorization

cryptology

impersonation

spoofing

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Which three processes are examples of logical access controls? (Choose three.)

intrusion detection system (IDS) to watch for suspicious network activity

firewalls to monitor traffic

guards to monitor security screens

biometrics to validate physical characteristics

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

masking

hiding

obfuscation

steganography

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?