F6-CS Security MCQ

F6-CS Security MCQ

12th Grade

10 Qs

quiz-placeholder

Similar activities

SECURITY BASICS AND IT PROFESSIONAL (SECURITY POLICIES)

SECURITY BASICS AND IT PROFESSIONAL (SECURITY POLICIES)

9th - 12th Grade

12 Qs

Big Data & Cyber

Big Data & Cyber

9th - 12th Grade

15 Qs

[AP CSP] Cryptography and Ciphers

[AP CSP] Cryptography and Ciphers

9th - 12th Grade

15 Qs

Part C Unit 10 Practice Exam

Part C Unit 10 Practice Exam

9th - 12th Grade

10 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

Rail Fence Cipher

Rail Fence Cipher

12th Grade - University

15 Qs

Khan Academy Cryptography

Khan Academy Cryptography

9th - 12th Grade

10 Qs

ICT - FORM 4

ICT - FORM 4

KG - University

10 Qs

F6-CS Security MCQ

F6-CS Security MCQ

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Adrien Ebitner

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term cipher when used in cryptography?

A an encryption or decryption algorithm

B an encrypted message

C a type of session key

D a digital signature

E text following an encryption algorithm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When carrying out asymmetric encryption, which of the following users would keep the private key?

A the sender

B the receiver

C both sender and receiver

D all recipients of the message

E none of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, which of the following is the term used to describe the message before it is encrypted?

A simpletext

B plaintext

C notext

D ciphertext

E firsttext

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the biggest disadvantage of using symmetric encryption?

A it is very complex and time consuming

B it is rarely used any more

C the value of the key reads the same in both directions

D it only works on computers with older operating systems

E there is a security problem when transmitting the secret key

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the correct name for a form of encryption in which both the sender and the recipient use the same key to encrypt/ decrypt?

A symmetric key encryption

B asymmetric key encryption

C public key encryption

D same key encryption

E block cipher encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is involved in temporary key generation?

A session keys

B private key and certificate

C public key and certificate

D master keys

E public keys

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a correct statement about PKIs?

A they use private and public keys but not digital certificates

B they use digital signatures and public keys 42317.4 Digital signatures and digital certificates

C they are a combination of digital certificates, public key cryptography and CAs

D they use asymmetric keys, hashing algorithms and certificate authorities

E they are a combination of digests, hashing algorithms and asymmetric cryptographic algorithms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?