CSF - Chapter 4 - 2024

CSF - Chapter 4 - 2024

9th - 12th Grade

39 Qs

quiz-placeholder

Similar activities

Computer Apps Final Exam

Computer Apps Final Exam

9th Grade

41 Qs

ms excel kelas 6

ms excel kelas 6

6th Grade - University

35 Qs

Internet Protocol (IP) Overview

Internet Protocol (IP) Overview

10th Grade

37 Qs

Asesmen Sumatif

Asesmen Sumatif

12th Grade

42 Qs

UH-1 Informatika Kelas XII.7

UH-1 Informatika Kelas XII.7

12th Grade

36 Qs

UTS 3D Animasi

UTS 3D Animasi

11th Grade - University

35 Qs

Linux File Permissions / commands Basic Quiz

Linux File Permissions / commands Basic Quiz

10th Grade - University

36 Qs

STS INFORMATIKA X  CADANGAN

STS INFORMATIKA X CADANGAN

10th Grade

40 Qs

CSF - Chapter 4 - 2024

CSF - Chapter 4 - 2024

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Practice Problem

Medium

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

block

hash

stream

elliptical

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

3DES

Vignere

AES

Skipjack

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

asymmetric

hash

symmetric

one-time pad

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

deterrent

detective

preventive

masking

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What term is used to describe the technology that replaces sensitive information with a nonsensitive version?

blanking

=hiding

retracting

whiteout

masking

Answer explanation

Refer to curriculum topic: 4.3.1
Data masking replaces sensitive information with nonsensitive information. After replacement, the nonsensitive version looks and acts like the original.

The correct answer is: masking

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which three processes are examples of logical access controls? (Choose three.)

guards to monitor security screens

swipe cards to allow access to a restricted area

intrusion detection system (IDS) to watch for suspicious network activity

biometrics to validate physical characteristics

firewalls to monitor traffic

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which three protocols use asymmetric key algorithms? (Choose four.)

Internet Key Exchange (IKE)

Secure Socket Layer (SSL)

Secure Shell (SSH)

Pretty Good Privacy (PGP)

Secure File Transfer Protocol (SFTP)

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?