9618 CS 17.1 Quiz

9618 CS 17.1 Quiz

12th Grade

6 Qs

quiz-placeholder

Similar activities

AP CSP Review

AP CSP Review

9th - 12th Grade

10 Qs

APCSP Cyber

APCSP Cyber

9th - 12th Grade

10 Qs

Communication & Networking - Security Measures

Communication & Networking - Security Measures

2nd - 12th Grade

10 Qs

Packet Switching and Encryption

Packet Switching and Encryption

10th - 12th Grade

11 Qs

Technical Terms - Internet (A-Z) - VoIP

Technical Terms - Internet (A-Z) - VoIP

12th Grade

10 Qs

Cybersecurity

Cybersecurity

12th Grade

10 Qs

Cyber Security Quiz

Cyber Security Quiz

12th Grade

10 Qs

IGCSE ICT - Safety and Security

IGCSE ICT - Safety and Security

10th - 12th Grade

7 Qs

9618 CS 17.1 Quiz

9618 CS 17.1 Quiz

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Robert Morrison

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of symmetric encryption?

A basic type of encryption that is not very robust

Encryption that uses the same key for encrypting and decrypting

Encryption that uses the same algorithm for encrypting and decrypting

An advanced form of encryption that makes use of multiple keys.

2.

MATCH QUESTION

1 min • 1 pt

Match the following

Produced by putting the plain text through a hash algorithm

Digest

Used for encrypting plain text

Private Key

Used for decrypting cipher text

Public Key

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The type of encryption that uses two keys is called __________ key cryptography

4.

DRAG AND DROP QUESTION

1 min • 1 pt

A digital certificate is used to verify ​ (a)   of a device or service. They are distributed by a ​ (b)   . The ​ (c)   protocol makes use of these certificates during the ​ (d)   process where both sides verify each other.

the identity
certificate authority
SSL/TLS
handshake
introduction
the IP address
certificate agency
TCP/IP

5.

REORDER QUESTION

1 min • 1 pt

Reorder the following statements to describe the basic asymmetric encryption process

The sender encrypts the plain text into cipher text, and sends it to the recipient

The recipient sends the public key to the sender

The recipient decrypts the cipher text with their private key

The sender contacts the recipient to begin an an encrypted communication session

The recipient generates the private and public keys

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique is used to verify that a message was not modified during transmission?

Digital Certificate

Asymmetric Encryption

Digital Signature

Digests