
Cibrscurtiy
Authored by Adrian Taylor
Computers
9th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What is Symmetric encryption?
It uses the same key to encrypt and decrypt data
Asymmetric encryption
Private Key encryption
It uses a pair of related keys to encrypt and decrypt data
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the CIA triad?
Confidentiality, Integrity, and Availability
Cars, in, the air
Chickens, introducing, apples
Clocks, identifying, the alphabet
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Hashing
cooking hashbrowns
the process of transforming any given key or a string of characters into another value and can be changed back
opening a trenchcoat infront of children
the process of transforming any given key or a string of characters into another value and cant be changed back
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How many layers of firewall is needed before a devices is considered DMZ
100
2
1
5
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is port 20 and 21
UDP
FTP
PP
CPS
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Virus
sisters
moms
A form of malware that spreads to files and spreads its damage through those files.
Covid
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
help ensure systems and their resources are only accessed by authorized personnel and that activity on those systems is tracked.
AAA
Monkeys
Ransomware
Accounting
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?