CSF Practice 3 - Chapter 4

CSF Practice 3 - Chapter 4

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

TIK SMP

TIK SMP

7th - 12th Grade

25 Qs

Primary 1 Computing Term 2 Assessment

Primary 1 Computing Term 2 Assessment

1st Grade - University

21 Qs

System Administration

System Administration

10th Grade

22 Qs

CPA 3NT Paper 1 Quiz 4 (Bukit Panjang High)

CPA 3NT Paper 1 Quiz 4 (Bukit Panjang High)

10th - 12th Grade

20 Qs

D.M.B.K's quizzez

D.M.B.K's quizzez

11th - 12th Grade

20 Qs

Internet Security

Internet Security

10th Grade

28 Qs

ICT Quiz

ICT Quiz

9th - 10th Grade

25 Qs

Unit 1 Module 2 Objective 14-15

Unit 1 Module 2 Objective 14-15

11th - 12th Grade

20 Qs

CSF Practice 3 - Chapter 4

CSF Practice 3 - Chapter 4

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Medium

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Provide ONE method of creating ciphertext

2.

OPEN ENDED QUESTION

3 mins • 1 pt

List TWO types of encryption algorithm and provide ONE encryption standard for each class.

Evaluate responses using AI:

OFF

Answer explanation

Symmetric

Any 1 example below,

• Triple Digital Encryption Standard / 3DES

• International Data Encryption Algorithm / IDEA

• Advanced Encryption Standard / AES

Asymmetric

Any 1 example below

• Rivest_Shamir-Adleman / RSA

• Diffie-Hellman

• ElGamal

• Elliptic Curve Cryptography / ECC

3.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

A product consultant had recommended to his team an algorithm that is used in New Technology File System (NTFS). The U.S. government uses the same algorithm to protect classified information.Identify the algorithm recommended by the product consultant.

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

A product consultant had recommended to his team an algorithm that is used in New Technology File System (NTFS). The U.S. government uses the same algorithm to protect classified information. Name the type of encryption used for the algorithm.

5.

OPEN ENDED QUESTION

3 mins • 1 pt

A product consultant had recommended to his team an algorithm that is used in New Technology File System (NTFS). The U.S. government uses the same algorithm to protect classified information. Describe the encryption that you have named

Evaluate responses using AI:

OFF

Answer explanation

use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.

Both the sender and receiver know the pre-shared key before any encrypted communication begins.

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

List TWO types of encryption algorithm

7.

OPEN ENDED QUESTION

3 mins • 1 pt

State THREE differences between Symmetric and Asymmetric algorithm.

Evaluate responses using AI:

OFF

Answer explanation

Symmetric:

more efficient, handle more/larger data

more problematic

harder to manage

Asymmetric:

More efficient, small amount data

More secure

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Instructional Technology