Cybersecurity Chapter 4

Cybersecurity Chapter 4

11th Grade

9 Qs

quiz-placeholder

Similar activities

5.5 Caesar Cipher Part 1

5.5 Caesar Cipher Part 1

10th - 12th Grade

4 Qs

Quiz 5 Keamanan Jaringan

Quiz 5 Keamanan Jaringan

KG - University

5 Qs

Y8 Homework Weeks 3-4

Y8 Homework Weeks 3-4

9th - 12th Grade

12 Qs

Cryptography GCSE

Cryptography GCSE

9th - 12th Grade

10 Qs

GCSE - Flowcharts

GCSE - Flowcharts

11th Grade

10 Qs

1.3.1 - Encryption & Hashing

1.3.1 - Encryption & Hashing

8th - 12th Grade

13 Qs

CSF U4 Data p2

CSF U4 Data p2

9th - 12th Grade

6 Qs

Blockchain

Blockchain

5th Grade - Professional Development

10 Qs

Cybersecurity Chapter 4

Cybersecurity Chapter 4

Assessment

Quiz

Computers

11th Grade

Hard

Created by

E Sheng Toh

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the mac type of access control is implemented?

detective

preventive

masking

deterrent

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

one-time pad

symmetric

asymmetric

hash

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

Caesar

AES

3DES

Vignere

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the science of making and breaking secret codes?

spoofing

impersonation

cryptology

jamming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?

block

transform

hash

symmetric

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

transposition

one-time pad

asymmetric

symmetric

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the technology that protects software from unauthorized access or modification?

copyright

trademark

access control

watermarking

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

stream

block

enigma

hash

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

Diffie-Hellman

RSA

WEP

DES