Cibrscurtiy

Cibrscurtiy

9th Grade

20 Qs

quiz-placeholder

Similar activities

1.2 The basics of encryption

1.2 The basics of encryption

9th Grade

10 Qs

J277 Network Threats

J277 Network Threats

7th - 11th Grade

10 Qs

AP CSP BI 5

AP CSP BI 5

9th - 12th Grade

9 Qs

Encryption quiz

Encryption quiz

9th Grade

10 Qs

Starter

Starter

9th - 10th Grade

10 Qs

Public Key Encryption

Public Key Encryption

7th - 12th Grade

10 Qs

CSP Unit 10 Pre-Assessment - Cybersecurity

CSP Unit 10 Pre-Assessment - Cybersecurity

9th - 12th Grade

10 Qs

Term2-Week 2-Session 2:Encryption

Term2-Week 2-Session 2:Encryption

9th Grade

10 Qs

Cibrscurtiy

Cibrscurtiy

Assessment

Quiz

Computers

9th Grade

Easy

Created by

Adrian Taylor

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What is Symmetric encryption?

It uses the same key to encrypt and decrypt data

Asymmetric encryption

Private Key encryption

It uses a pair of related keys to encrypt and decrypt data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the CIA triad?

Confidentiality, Integrity, and Availability

Cars, in, the air

Chickens, introducing, apples

Clocks, identifying, the alphabet

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Hashing

cooking hashbrowns

the process of transforming any given key or a string of characters into another value and can be changed back

opening a trenchcoat infront of children

the process of transforming any given key or a string of characters into another value and cant be changed back

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many layers of firewall is needed before a devices is considered DMZ

100

2

1

5

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is port 20 and 21

UDP

FTP

PP

CPS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Virus

sisters

moms

A form of malware that spreads to files and spreads its damage through those files.

Covid

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

help ensure systems and their resources are only accessed by authorized personnel and that activity on those systems is tracked.

AAA

Monkeys

Ransomware

Accounting

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?