Unit 4 Test

Unit 4 Test

11th Grade

25 Qs

quiz-placeholder

Similar activities

APCSP IOC-2.B Cybersecurity and Encryption

APCSP IOC-2.B Cybersecurity and Encryption

9th - 12th Grade

20 Qs

5.2 Requesting and retrieving  web pages

5.2 Requesting and retrieving web pages

9th Grade - University

23 Qs

Be Internet Awesome Part 1

Be Internet Awesome Part 1

6th - 12th Grade

21 Qs

Linux - Unit 8 Quiz

Linux - Unit 8 Quiz

9th - 12th Grade

20 Qs

Yr 11 ICT quiz 1 Networks & Security

Yr 11 ICT quiz 1 Networks & Security

10th - 11th Grade

20 Qs

C3 Crypto & PKI Review

C3 Crypto & PKI Review

9th - 12th Grade

26 Qs

8.4 Protection of data

8.4 Protection of data

9th - 12th Grade

20 Qs

019_Certificates - CompTIA Security+ SY0-701 - 1.4

019_Certificates - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

23 Qs

Unit 4 Test

Unit 4 Test

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Victoria Berkowitz

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A financial services company needs to send sensitive transaction details to a partner organization. To ensure confidentiality, they decide to use encryption. The key used to encrypt the data is different from the one used to decrypt it. What type of encryption are they using?

Hashing

Symmetric encryption

Asymmetric encryption

Obfuscation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An application development team is tasked with releasing a software tool to the public but wants to protect proprietary algorithms within the code. They modify the source code to make it harder to interpret. Which technique are they using?

A) Encryption

B) Tokenization

C) Obfuscation

D) Hashing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A journalist wants to send sensitive information hidden inside an image to a whistleblower. Which technique can they use to conceal the information without encrypting it?

A) Encryption

B) Steganography

C) Obfuscation

D) Hashing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of steganography?

To encrypt data using complex keys

To mask sensitive data in a database

To hide data within other files or media

To generate unique hashes for file integrity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A healthcare organization processes sensitive patient data. Instead of storing Social Security numbers directly, they replace them with unique identifiers that have no mathematical relationship to the original data. What method is this?

Data masking

Tokenization

Encryption

Salting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During software testing, a company replaces actual customer account numbers with fake but realistic-looking account numbers in their test environment. What technique are they using?

Data masking

Tokenization

Obfuscation

Hashing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An IT administrator needs to verify that a downloaded software file has not been tampered with. They compare a unique string provided by the software vendor with the one generated from the downloaded file. What method are they using?

Symmetric encryption

Hashing

Salting

Obfuscation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?