Ch14 Internet Security Measures (diff Q tagged)

Ch14 Internet Security Measures (diff Q tagged)

12th Grade

50 Qs

quiz-placeholder

Similar activities

AP CSP Review

AP CSP Review

9th - 12th Grade

50 Qs

database concepts

database concepts

12th Grade

51 Qs

Coding Units 5-10

Coding Units 5-10

9th - 12th Grade

46 Qs

CIB Lesson #3 & #4 Quiz

CIB Lesson #3 & #4 Quiz

9th - 12th Grade

45 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

9th - 12th Grade

45 Qs

Database (1)

Database (1)

9th - 12th Grade

55 Qs

IT Fundamentals Test Part 1

IT Fundamentals Test Part 1

KG - University

49 Qs

CSEC IT - 12 Networks

CSEC IT - 12 Networks

10th - 12th Grade

50 Qs

Ch14 Internet Security Measures (diff Q tagged)

Ch14 Internet Security Measures (diff Q tagged)

Assessment

Quiz

Computers

12th Grade

Hard

difficult

Standards-aligned

Created by

Maths Panel

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following descriptions about decryption is correct?

Decryption decompresses a compressed file.

Decryption converts a digital signal into an analog signal.

Decryption converts program encoding into machine code.

Decryption converts an unreadable piece of information into readable information using a decryption key.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements about symmetric key encryption is correct?

The encryption process and the decryption process are performed at the same time.

The key must be symmetric in a way that it spells the same forwards and backwards.

The sender and the receiver use the same key to encrypt and decrypt a message respectively.

The public key and the private key for an encryption are the same.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

1024-bit encryption is much stronger than 128-bit encryption. However, 1024-bit encryption is not commonly used in online transactions. Which of the following are the reasons for this? (1) Most computer devices cannot handle 1024-bit data. (2) It takes much longer time for encryption and decryption. (3) The file sizes of encrypted files grow significantly.

(1) and (2) only

(1) and (3) only

(2) and (3) only

(1), (2) and (3)

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following services can be provided by asymmetric key encryption (i.e. public and private key encryption)?

(1) only

(2) only

(2) and (3) only

(1), (2) and (3)

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A message is encrypted by a public key. It is then sent to the receiver and decrypted with a private key by him. In this way, the public key and private key encryption can be used to (1) ensure that only the sender and receiver can read the data (2) verify the sender's identity (3) verify the receiver's identity

(1) and (2) only

(1) and (3) only

(2) and (3) only

(1), (2) and (3)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following online activities involve data encryption?

(1) only

(2) only

(2) and (3) only

(1), (2) and (3)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is attacked by a hacker, who is using ransomware to demand a hefty sum of money from the company. Which of the following is the ransom tactic of the hacker?

The hacker encrypted the company's important data, causing the company to be unable to operate normally.

The hacker spread a virus within the company, making its employees unable to work.

The hacker kidnapped the company's senior employees, the company had no one to sign important documents.

The hacker destroyed the company's data, causing the company to not function properly.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers