Cybersecurity Chapter 4

Cybersecurity Chapter 4

11th Grade

9 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals Week 4 Quiz

Cybersecurity Fundamentals Week 4 Quiz

KG - University

10 Qs

Encryption - AQA A Level Computer Science

Encryption - AQA A Level Computer Science

11th - 12th Grade

10 Qs

A level CIE Security

A level CIE Security

10th - 12th Grade

12 Qs

encryptions and dos

encryptions and dos

9th - 11th Grade

9 Qs

2.6 Encryption

2.6 Encryption

9th Grade - University

9 Qs

J277 - Wireless Networks

J277 - Wireless Networks

8th - 11th Grade

11 Qs

Packet Switching and Encryption

Packet Switching and Encryption

10th - 12th Grade

11 Qs

Cryptography

Cryptography

7th - 12th Grade

10 Qs

Cybersecurity Chapter 4

Cybersecurity Chapter 4

Assessment

Quiz

Computers

11th Grade

Hard

Created by

E Sheng Toh

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the mac type of access control is implemented?

detective

preventive

masking

deterrent

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

one-time pad

symmetric

asymmetric

hash

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

Caesar

AES

3DES

Vignere

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the science of making and breaking secret codes?

spoofing

impersonation

cryptology

jamming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?

block

transform

hash

symmetric

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

transposition

one-time pad

asymmetric

symmetric

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the technology that protects software from unauthorized access or modification?

copyright

trademark

access control

watermarking

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

stream

block

enigma

hash

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

Diffie-Hellman

RSA

WEP

DES