Chapter 4: The Art of Protecting Secrets Quiz

Chapter 4: The Art of Protecting Secrets Quiz

12th Grade

20 Qs

quiz-placeholder

Similar activities

8 клас Пайтон 1

8 клас Пайтон 1

12th Grade

24 Qs

HTML tags

HTML tags

9th - 12th Grade

20 Qs

Adobe Illustrator Basics - Quiz 1

Adobe Illustrator Basics - Quiz 1

9th - 12th Grade

15 Qs

Balises HTML & CSS

Balises HTML & CSS

8th Grade - University

20 Qs

CSP Basic Scratch Concepts

CSP Basic Scratch Concepts

9th - 12th Grade

20 Qs

Linux-2 Quiz 2 -- LAMP

Linux-2 Quiz 2 -- LAMP

1st - 12th Grade

15 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Class Quiz Expert Systems by George

Class Quiz Expert Systems by George

10th - 12th Grade

16 Qs

Chapter 4: The Art of Protecting Secrets Quiz

Chapter 4: The Art of Protecting Secrets Quiz

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Clint Anthony

Used 10+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which asymmetric algorithm provides an electronic key exchange method to share the secret key?

RSA

Diffie-Hellman

WEP

DES

hashing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

transposition

symmetric

asymmetric

one-time pad

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

block

stream

hash

enigma

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

ECC

RSA

AES

El-Gamal

IDEA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the science of making and breaking secret codes?

factorization

cryptology

impersonation

spoofing

jamming

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three processes are examples of logical access controls? (Choose three.)

guards to monitor security screens

intrusion detection system (IDS) to watch for suspicious network activity

firewalls to monitor traffic

fences to protect the perimeter of a building

biometrics to validate physical characteristics

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe concealing data in another file such as a graphic, audio, or other text file?

masking

hiding

obfuscation

steganography

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?