
Ch14 Internet Security Measures (diff Q tagged)

Quiz
•
Computers
•
12th Grade
•
Hard
Standards-aligned
Maths Panel
Used 1+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following descriptions about decryption is correct?
Decryption decompresses a compressed file.
Decryption converts a digital signal into an analog signal.
Decryption converts program encoding into machine code.
Decryption converts an unreadable piece of information into readable information using a decryption key.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements about symmetric key encryption is correct?
The encryption process and the decryption process are performed at the same time.
The key must be symmetric in a way that it spells the same forwards and backwards.
The sender and the receiver use the same key to encrypt and decrypt a message respectively.
The public key and the private key for an encryption are the same.
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
1024-bit encryption is much stronger than 128-bit encryption. However, 1024-bit encryption is not commonly used in online transactions. Which of the following are the reasons for this? (1) Most computer devices cannot handle 1024-bit data. (2) It takes much longer time for encryption and decryption. (3) The file sizes of encrypted files grow significantly.
(1) and (2) only
(1) and (3) only
(2) and (3) only
(1), (2) and (3)
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following services can be provided by asymmetric key encryption (i.e. public and private key encryption)?
(1) only
(2) only
(2) and (3) only
(1), (2) and (3)
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A message is encrypted by a public key. It is then sent to the receiver and decrypted with a private key by him. In this way, the public key and private key encryption can be used to (1) ensure that only the sender and receiver can read the data (2) verify the sender's identity (3) verify the receiver's identity
(1) and (2) only
(1) and (3) only
(2) and (3) only
(1), (2) and (3)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following online activities involve data encryption?
(1) only
(2) only
(2) and (3) only
(1), (2) and (3)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company is attacked by a hacker, who is using ransomware to demand a hefty sum of money from the company. Which of the following is the ransom tactic of the hacker?
The hacker encrypted the company's important data, causing the company to be unable to operate normally.
The hacker spread a virus within the company, making its employees unable to work.
The hacker kidnapped the company's senior employees, the company had no one to sign important documents.
The hacker destroyed the company's data, causing the company to not function properly.
Create a free account and access millions of resources
Similar Resources on Wayground
50 questions
Logic Pro X: Test 1

Quiz
•
10th - 12th Grade
50 questions
Authentication/Access Control/Enterprise Architecture

Quiz
•
9th Grade - University
47 questions
MS Word Preliminary Examination

Quiz
•
10th Grade - University
46 questions
CompTIA Security+ Testout Practice Quiz - Section 3 Part 1

Quiz
•
12th Grade
49 questions
2024 Robotics Competition Quiz

Quiz
•
12th Grade
50 questions
Year 12 AIT Exam Revision

Quiz
•
12th Grade
47 questions
S3 Assessment Revision

Quiz
•
9th - 12th Grade
55 questions
SQL MCQs - Class 12

Quiz
•
12th Grade
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade