CSF - Chapter 4 - 2024

CSF - Chapter 4 - 2024

9th - 12th Grade

39 Qs

quiz-placeholder

Similar activities

ASSESMENT INFORMATIKA

ASSESMENT INFORMATIKA

10th Grade

40 Qs

Understanding Social Engineering Threats

Understanding Social Engineering Threats

11th Grade

40 Qs

Cyber Security Quiz

Cyber Security Quiz

12th Grade

35 Qs

PSTS INFORMATIKA GANJIL 25-26

PSTS INFORMATIKA GANJIL 25-26

10th Grade

40 Qs

Tech+ 7.3/4

Tech+ 7.3/4

10th Grade

41 Qs

Quiz Pengetahuan Umum TIK

Quiz Pengetahuan Umum TIK

9th Grade - University

39 Qs

Computer Hardware Quiz

Computer Hardware Quiz

11th Grade

40 Qs

Cambridge Technicals in IT - Unit 02 - LO2.4

Cambridge Technicals in IT - Unit 02 - LO2.4

11th - 12th Grade

35 Qs

CSF - Chapter 4 - 2024

CSF - Chapter 4 - 2024

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Used 1+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What type of cipher encrypts plaintext one byte or one bit at a time?

block

hash

stream

elliptical

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?

3DES

Vignere

AES

Skipjack

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

asymmetric

hash

symmetric

one-time pad

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?

deterrent

detective

preventive

masking

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What term is used to describe the technology that replaces sensitive information with a nonsensitive version?

blanking

=hiding

retracting

whiteout

masking

Answer explanation

Refer to curriculum topic: 4.3.1
Data masking replaces sensitive information with nonsensitive information. After replacement, the nonsensitive version looks and acts like the original.

The correct answer is: masking

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which three processes are examples of logical access controls? (Choose three.)

guards to monitor security screens

swipe cards to allow access to a restricted area

intrusion detection system (IDS) to watch for suspicious network activity

biometrics to validate physical characteristics

firewalls to monitor traffic

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which three protocols use asymmetric key algorithms? (Choose four.)

Internet Key Exchange (IKE)

Secure Socket Layer (SSL)

Secure Shell (SSH)

Pretty Good Privacy (PGP)

Secure File Transfer Protocol (SFTP)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?