Chapter 4 Quiz

Chapter 4 Quiz

University

12 Qs

quiz-placeholder

Similar activities

014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

Unit 10 - Internet Security

Unit 10 - Internet Security

12th Grade - University

13 Qs

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

013_Encrypting Data - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

012_Public Key Infrastructure - CompTIA Security+ Sy0-701 - 1.4

12th Grade - University

15 Qs

Data Ecryption

Data Ecryption

University

16 Qs

Cryptology Tools

Cryptology Tools

University

15 Qs

Security

Security

12th Grade - University

12 Qs

CSP Unit 10 Cybersecurity

CSP Unit 10 Cybersecurity

12th Grade - University

13 Qs

Chapter 4 Quiz

Chapter 4 Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Kevin Wong

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the technology that protects software from unauthorized access or modification?

trademark

copyright

watermarking

access control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data is likely to be an organisation most valuable assets. True or False?

TRUE

False

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three protocols use asymmetric key algorithms? (Choose three.)

Secure Shell (SSH)

Advanced Encryption Standard (AES)

Secure Sockets Layer (SSL)

Pretty Good Privacy (PGP)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

radiography

steganography

enciphergraphy

deciphergraphy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

WEP

DES

RSA

Diffie-Hellman (DH)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

symmetric

asymmetric

transposition

one-time pad

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which three devices represent examples of physical access controls? (Choose three.)

locks

firewalls

swipe cards

video cameras

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?