Chapter 4 Cybersecurity

Chapter 4 Cybersecurity

University

10 Qs

quiz-placeholder

Similar activities

AES Quiz

AES Quiz

University

9 Qs

Asymmetric encryption

Asymmetric encryption

12th Grade - University

10 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

University

15 Qs

computer science

computer science

University

10 Qs

Virtualization

Virtualization

University

12 Qs

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

8th Grade - University

14 Qs

Quiz 1

Quiz 1

University

11 Qs

Chapter 4 Cybersecurity

Chapter 4 Cybersecurity

Assessment

Quiz

Computers

University

Hard

Created by

Ria Castillo

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What encryption algorithm uses one key to encrypt data and a different key to decrypt data?

asymmetric

symmetric

one-time pad

transposition

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

Vignere

Caesar

AES

3DES

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?

RSA

AES

IDEA

ECC

4.

MULTIPLE SELECT QUESTION

45 sec • 2 pts

What are three examples of administrative access controls? (Choose two.)

guard dogs

policies and procedures

encryption

background checks

5.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

Which three processes are examples of logical access controls? (Choose three.)

fences to protect the perimeter of a building

biometrics to validate physical characteristics


swipe cards to allow access to a restricted area

intrusion detection system (IDS) to watch for suspicious network activity

firewalls to monitor traffic

6.

FILL IN THE BLANK QUESTION

1 min • 2 pts

_______________ encryption algorithms use the same pre-shared key to encrypt and decrypt data.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term describes the technology that protects software from unauthorized access or modification?

copyright

trademark

watermarking

access control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?