Cybersecurity

Cybersecurity

12th Grade

18 Qs

quiz-placeholder

Similar activities

006_Gap Analysis1.2

006_Gap Analysis1.2

12th Grade - University

20 Qs

APCSP IOC-2.B Cybersecurity and Encryption

APCSP IOC-2.B Cybersecurity and Encryption

9th - 12th Grade

20 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

Blockchain Basics

Blockchain Basics

12th Grade

15 Qs

cybersecurity_1

cybersecurity_1

12th Grade

14 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Blockchain Components

Blockchain Components

12th Grade

20 Qs

Network Architectures

Network Architectures

7th - 12th Grade

22 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Oshel Tampus

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It refers to the practice and study of techniques for secure communication in the presence of third parties, often referred to as adversaries. It involves creating and analyzing protocols that prevent third parties or the public from reading private messages.

Cybersecurity

Cryptography

Computer Security

Network Security

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What is this security that refers to the practice of protecting system, networks, and programs from digital attacks?

Cybersecurity

Computer Security

Network Security

Cruptography

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

This is the practice of safeguarding digital networks and data from unauthorized access, misuse, alteration, or destruction?

Cybersecurity

Computer Security

Network Security

Cruptography

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

It is one of the features of cryptography that means only information can be accessed by the person for whom it is intended, and no one can access without permission.

Authentication

Non-repudiation

Integrity

Confidentiality

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A feature of cryptography that confirmed the sender and receiver identities as well as the destination or origin of information.

Authentication

Non-repudiation

Integrity

Confidentiality

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which cryptographic type or technique involves the use of two keys, a public key for encryption and a private key for decryption?

Asymmetric key

Symmetric key

Hash function

Steganography

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A cryptographic technique that utilizes mathematical algorithm that takes an input and produces a fixed-size string of characters, which is typically a hexadecimal number?

Asymmetric key

Symmetric key

Hash function

Steganography

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?