Unit 17 Encryption and Security Quiz

Unit 17 Encryption and Security Quiz

12th Grade

10 Qs

quiz-placeholder

Similar activities

PBD 1.1.4 Penyulitan & Nyahsulit Data ( Caeser Cipher )

PBD 1.1.4 Penyulitan & Nyahsulit Data ( Caeser Cipher )

1st Grade - University

13 Qs

Cryptography AP CSP

Cryptography AP CSP

9th - 12th Grade

15 Qs

Rail Fence Cipher

Rail Fence Cipher

12th Grade - University

15 Qs

File Encryption Quiz

File Encryption Quiz

12th Grade

15 Qs

J277 Utility Software (Encryption & Defragmentation)

J277 Utility Software (Encryption & Defragmentation)

10th - 12th Grade

10 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

[AP CSP] Cryptography and Ciphers

[AP CSP] Cryptography and Ciphers

9th - 12th Grade

15 Qs

CSP 2.1.5 Secure Protocols

CSP 2.1.5 Secure Protocols

10th - 12th Grade

12 Qs

Unit 17 Encryption and Security Quiz

Unit 17 Encryption and Security Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Michael Harrington

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of encryption?

To enhance data visualization

To prevent data interception

To increase data transmission speed

To compress data size

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main security concern related to data transmission?

Interoperability

Availability

Confidentiality

Scalability

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

What is the original data being sent known as?

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

What is the product when plaintext is put through an encryption algorithm?

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the encryption method that uses the same secret key to encrypt and decrypt the encoded message?

Quantum cryptography

Asymmetric encryption

Symmetric encryption

Block cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the security issue inherent in symmetric encryption arising from the risk of the key being intercepted by an eavesdropper/hacker?

Eavesdropper

Stream cipher

Block chaining

Key distribution problem

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of encryption uses two keys - a public key and a private key?

Block cipher

Symmetric encryption

Quantum cryptography

Asymmetric encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?