Which of the following technical controls can be used to verify the integrity of a file?
AP CK CyberSecurity Unit 3

Quiz
•
Information Technology (IT)
•
12th Grade
•
Easy
Kristina Rice
Used 3+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
DLP software
Network firewall
Cryptographic file hash
Symmetric encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A high school teacher has access to their students’ standardized test scores. While emailing a parent, the teacher accidentally attaches an entire class’s test scores to the email.
The IT department at the school has specialized software installed that recognized and stopped the confidential test score files from being transmitted.
What type of specialized software prevented the email transmission?
DLP software
Anti-malware software
IDS software
Access control software
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes the length of a cryptographic hash function output?
The length of the hash varies depending on the size of the file
The length of the hash is the same length as the input
The length of the hash is a fixed length
The length of the hash is determined by the encryption key
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A software development company has released a new version of their most popular application. They published the application on their website along with the following cryptographic hash of the file.
U5FNWtVlOim7oaMGds6y
A user downloads and hashes the application using the same cryptographic hashing algorithm as the software development company. The result is the following hash.
U5FNWtVlOim7oaMGds6y
What is the purpose of checking the file hash as described?
To verify that the file size is correct
To confirm that the file has not been tampered with
To check that the file is compatible with their operating system
To ensure that the file was only downloaded from the company’s website
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a shift cipher with a shift of 5 to send a word to a friend. '“CYBER” is the word you want to send to your friend. What message should you send?
PLORE
CBRYE
HYPER
HDGJW
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Person A wants to send a message to Person B using a pre-defined key.
Person A will send ciphertext to Person B
Person B will be able to decrypt the message using the same key that encrypted it.
What is the appropriate cryptographic algorithm for this situation?
Symmetric encryption
Asymmetric encryption
Cryptographic hash function
Public key encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one effect of using a long encryption key?
It speeds up the encryption process
It makes it harder for an adversary to guess the correct key
It reduces the size of the encrypted data
It ensures the data is more compressed
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Network secutiry

Quiz
•
9th Grade - University
10 questions
Understanding Security and Encryption

Quiz
•
12th Grade
15 questions
Lesson 6: Criminal Use

Quiz
•
9th - 12th Grade
15 questions
Computer Science Concepts Quiz

Quiz
•
12th Grade
15 questions
Lesson 2: Internal Threats and Impacts

Quiz
•
9th - 12th Grade
15 questions
Prueba de Seguridad Informática

Quiz
•
12th Grade
15 questions
Data Encryption Standards Quiz

Quiz
•
12th Grade
15 questions
Fundamentals of Cryptography Quiz

Quiz
•
12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade