Chapter 4 Quiz

Chapter 4 Quiz

University

12 Qs

quiz-placeholder

Similar activities

science day competition(Networks & Information Security)

science day competition(Networks & Information Security)

University

15 Qs

Quiz Topic 6

Quiz Topic 6

University

10 Qs

CryptoQuiz

CryptoQuiz

University

15 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

FQuiz2 BSIT4C

FQuiz2 BSIT4C

University

15 Qs

HASHING IN DBMS

HASHING IN DBMS

University

15 Qs

F2 First ICT Online Quiz

F2 First ICT Online Quiz

7th Grade - University

17 Qs

SURVEILLANCE CONTROL SYSTEM

SURVEILLANCE CONTROL SYSTEM

University

15 Qs

Chapter 4 Quiz

Chapter 4 Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Kevin Wong

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the technology that protects software from unauthorized access or modification?

trademark

copyright

watermarking

access control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data is likely to be an organisation most valuable assets. True or False?

TRUE

False

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three protocols use asymmetric key algorithms? (Choose three.)

Secure Shell (SSH)

Advanced Encryption Standard (AES)

Secure Sockets Layer (SSL)

Pretty Good Privacy (PGP)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

radiography

steganography

enciphergraphy

deciphergraphy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

WEP

DES

RSA

Diffie-Hellman (DH)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

symmetric

asymmetric

transposition

one-time pad

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three devices represent examples of physical access controls? (Choose three.)

locks

firewalls

swipe cards

video cameras

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?