
Unit 4 Test
Quiz
•
Computers
•
11th Grade
•
Practice Problem
•
Easy
Victoria Berkowitz
Used 3+ times
FREE Resource
Enhance your content in a minute
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A financial services company needs to send sensitive transaction details to a partner organization. To ensure confidentiality, they decide to use encryption. The key used to encrypt the data is different from the one used to decrypt it. What type of encryption are they using?
Hashing
Symmetric encryption
Asymmetric encryption
Obfuscation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An application development team is tasked with releasing a software tool to the public but wants to protect proprietary algorithms within the code. They modify the source code to make it harder to interpret. Which technique are they using?
A) Encryption
B) Tokenization
C) Obfuscation
D) Hashing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A journalist wants to send sensitive information hidden inside an image to a whistleblower. Which technique can they use to conceal the information without encrypting it?
A) Encryption
B) Steganography
C) Obfuscation
D) Hashing
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of steganography?
To encrypt data using complex keys
To mask sensitive data in a database
To hide data within other files or media
To generate unique hashes for file integrity
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A healthcare organization processes sensitive patient data. Instead of storing Social Security numbers directly, they replace them with unique identifiers that have no mathematical relationship to the original data. What method is this?
Data masking
Tokenization
Encryption
Salting
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During software testing, a company replaces actual customer account numbers with fake but realistic-looking account numbers in their test environment. What technique are they using?
Data masking
Tokenization
Obfuscation
Hashing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An IT administrator needs to verify that a downloaded software file has not been tampered with. They compare a unique string provided by the software vendor with the one generated from the downloaded file. What method are they using?
Symmetric encryption
Hashing
Salting
Obfuscation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Google SketchUp Tool
Quiz
•
KG - University
20 questions
Technology Innovations
Quiz
•
5th - 12th Grade
22 questions
Steve Jobs
Quiz
•
6th - 12th Grade
20 questions
iMovie App Quiz
Quiz
•
6th - 12th Grade
25 questions
Electronic Components
Quiz
•
9th - 12th Grade
25 questions
2.6 The Internet Address (IPv4 & IPv6)
Quiz
•
11th - 12th Grade
20 questions
Excel Spreadsheet Fun (2nd)
Quiz
•
10th - 12th Grade
20 questions
Teknologi Layanan Jaringan XI TKJ
Quiz
•
11th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
