decryption

decryption

10th Grade

12 Qs

quiz-placeholder

Similar activities

Y10 Midcourse Warm-up P1

Y10 Midcourse Warm-up P1

9th - 12th Grade

15 Qs

J277 Utility Software (Encryption & Defragmentation)

J277 Utility Software (Encryption & Defragmentation)

10th - 12th Grade

10 Qs

Cybersecurity Ethics

Cybersecurity Ethics

10th Grade - University

10 Qs

Encryption

Encryption

9th - 11th Grade

10 Qs

CSP 2.1.5 Secure Protocols

CSP 2.1.5 Secure Protocols

10th - 12th Grade

12 Qs

Year 10 SBA Revision (Last Questions)

Year 10 SBA Revision (Last Questions)

9th - 11th Grade

7 Qs

Unit 4 Big Data

Unit 4 Big Data

10th - 12th Grade

11 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

decryption

decryption

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Arasaka Teacher

Used 1+ times

FREE Resource

12 questions

Show all answers

1.

DRAG AND DROP QUESTION

2 mins • 4 pts

Data is encrypted to keep it safe during transmission.

Complete the paragraph about asymmetric encryption.

 .......................................​ (a)   ...................... is encrypted into ..................................​ (b)   ............................ using a ........................................​​ (c)   ...................... . The encrypted data is then transmitted from the sender to the receiver. The encrypted data is then decrypted using a

..................​ (d)   ........................................ .

plain text
cipher text
public key
. private key ..
decrypted
symmetric
asymmetric

2.

DROPDOWN QUESTION

1 min • 1 pt

·  Encryption converts plain text into unreadable ​ ​ (a)   .

·  An algorithm and a key are used for encryption and decryption.

·  The same key is needed to both encrypt and decrypt the data.

·  The key can be created using an algorithm.

·  The key must be securely shared with the receiver.

·  If someone else gets the key, they can read the data.

·  ​ (b)   protects information and keeps it private.

Encryption
cipher text
decryption
plain text
hash value

3.

DRAG AND DROP QUESTION

1 min • 1 pt

Give the purpose of encryption.

 To help keep the ​ (a)  

· To make the data ​ (b)  

data secure
meaningless

4.

FILL IN THE BLANK QUESTION

2 mins • 4 pts

Symmetric encryption uses a shared key …

… which is used for both —————— and decryption.

Both the sender and receiver must know the key in advance.

If the key is leaked, anyone can decrypt the data.

Asymmetric encryption uses two different keys // a—————— and a———————— .

… The public key is used to encrypt the data, and the private key is used to decrypt it.

… Anyone can know the public key, but only the intended recipient has the private key.

Asymmetric encryption provides better security for communication but is slower than symmetric encryption.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

对称性加密

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

非对称性加密

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

解密

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?