SDF Q8 U2

SDF Q8 U2

12th Grade

10 Qs

quiz-placeholder

Similar activities

J277 Utility Software (Encryption & Defragmentation)

J277 Utility Software (Encryption & Defragmentation)

10th - 12th Grade

10 Qs

1.3.1. Compression, Encryption and Hashing

1.3.1. Compression, Encryption and Hashing

12th Grade

13 Qs

File Encryption Quiz

File Encryption Quiz

12th Grade

15 Qs

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

11th Grade - University

9 Qs

Cryptography AP CSP

Cryptography AP CSP

9th - 12th Grade

15 Qs

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

Cybersecurity Fundamentals Week 2 Quiz

Cybersecurity Fundamentals Week 2 Quiz

KG - University

10 Qs

SDF Q8 U2

SDF Q8 U2

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Rebecca Sims

Used 11+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________________ is the scrambling of data so that it is basically undecipherable with a decryption key.

Hasing

Digital Signature

Encryption

Key

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

AES is _________________.

Advanced Encryption Standard

Advanced Encoding Scheme

Advanced Encryption Scheme

Advanced Encoding Standard

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______________ is the scrambling of data, but is a one-way form of encryption.

Single line encryption

Hashing

Keying

SQL

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_______________ is is a mechanism used to improve integrity in a file as it goes from one recipient to another.

Single line encryption

Hashing

Keying

Digital signatures

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The key to hashing is that once data is re-entered if the hashes math, then the data matches as well.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital signatures use _____________________.

encryption

hashing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the same key is used by both parties for encrypting and decrypting, then a ______________ key was used.

symmetric

asymmetric

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?