
Chapter 4 on Cryptography and Security

Quiz
•
Computers
•
12th Grade
•
Hard
Stella Lai
Used 3+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
RSA
Diffie-Hellman
WEP
DES
hashing
Answer explanation
The Diffie-Hellman algorithm is specifically designed for secure key exchange, allowing two parties to generate a shared secret over an insecure channel. RSA is for encryption, while WEP and DES are not asymmetric algorithms.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
transposition
symmetric
asymmetric
one-time pad
Answer explanation
The correct answer is 'asymmetric' because this encryption algorithm uses a pair of keys: one for encryption and a different one for decryption, unlike symmetric algorithms which use the same key for both processes.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of cipher encrypts plaintext one byte or one bit at a time?
block
stream
hash
enigma
elliptical
Answer explanation
A stream cipher encrypts plaintext one byte or one bit at a time, making it suitable for real-time data transmission. In contrast, block ciphers encrypt fixed-size blocks of data, which is why 'stream' is the correct answer.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?
ECC
RSA
AES
El-Gamal
IDEA
Answer explanation
ECC, or Elliptic Curve Cryptography, is the algorithm used by the NSA for digital signatures and key exchange, leveraging the mathematical properties of elliptic curves for enhanced security and efficiency.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used to describe the science of making and breaking secret codes?
factorization
cryptology
impersonation
spoofing
jamming
Answer explanation
The science of making and breaking secret codes is known as cryptology. It encompasses both cryptography (creating codes) and cryptanalysis (breaking codes), making it the correct term for this field.
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which three processes are examples of logical access controls? (Choose three.)
intrusion detection system (IDS) to watch for suspicious network activity
firewalls to monitor traffic
fences to protect the perimeter of a building
biometrics to validate physical characteristics
guards to monitor security screens
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
masking
hiding
obfuscation
steganography
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Understanding HTTPS and Digital Signatures

Quiz
•
12th Grade - University
20 questions
Networking Scenarios

Quiz
•
9th - 12th Grade
27 questions
Chromebook Shortcuts

Quiz
•
2nd - 12th Grade
20 questions
JavaScript Game Development Newton

Quiz
•
9th Grade - University
20 questions
Compression, Encryption and Hashing

Quiz
•
12th Grade
21 questions
CIW IBA Lesson 8 Vocabulary

Quiz
•
8th Grade - Professio...
25 questions
Cybersecurity Essentials Chapter 4 Review

Quiz
•
9th Grade - University
20 questions
PhotoShop Test Review

Quiz
•
9th Grade - University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade