AP CK CyberSecurity Unit 3
Quiz
•
Information Technology (IT)
•
12th Grade
•
Practice Problem
•
Easy
Kristina Rice
Used 3+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following technical controls can be used to verify the integrity of a file?
DLP software
Network firewall
Cryptographic file hash
Symmetric encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A high school teacher has access to their students’ standardized test scores. While emailing a parent, the teacher accidentally attaches an entire class’s test scores to the email.
The IT department at the school has specialized software installed that recognized and stopped the confidential test score files from being transmitted.
What type of specialized software prevented the email transmission?
DLP software
Anti-malware software
IDS software
Access control software
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following describes the length of a cryptographic hash function output?
The length of the hash varies depending on the size of the file
The length of the hash is the same length as the input
The length of the hash is a fixed length
The length of the hash is determined by the encryption key
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A software development company has released a new version of their most popular application. They published the application on their website along with the following cryptographic hash of the file.
U5FNWtVlOim7oaMGds6y
A user downloads and hashes the application using the same cryptographic hashing algorithm as the software development company. The result is the following hash.
U5FNWtVlOim7oaMGds6y
What is the purpose of checking the file hash as described?
To verify that the file size is correct
To confirm that the file has not been tampered with
To check that the file is compatible with their operating system
To ensure that the file was only downloaded from the company’s website
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are using a shift cipher with a shift of 5 to send a word to a friend. '“CYBER” is the word you want to send to your friend. What message should you send?
PLORE
CBRYE
HYPER
HDGJW
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Person A wants to send a message to Person B using a pre-defined key.
Person A will send ciphertext to Person B
Person B will be able to decrypt the message using the same key that encrypted it.
What is the appropriate cryptographic algorithm for this situation?
Symmetric encryption
Asymmetric encryption
Cryptographic hash function
Public key encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one effect of using a long encryption key?
It speeds up the encryption process
It makes it harder for an adversary to guess the correct key
It reduces the size of the encrypted data
It ensures the data is more compressed
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
10 questions
REVIEW TIME
Quiz
•
9th Grade - University
14 questions
Programming Bach
Quiz
•
9th - 12th Grade
10 questions
Materi Berpikir Komputasional
Quiz
•
9th Grade - University
15 questions
Recap Handout 3 & 4
Quiz
•
6th Grade - University
15 questions
Table,Image formatting
Quiz
•
5th Grade - University
10 questions
Decision-Making Process in Data Modelling
Quiz
•
11th Grade - University
12 questions
UX: Week 2 CFU
Quiz
•
12th Grade
12 questions
Struktur Basis Data
Quiz
•
11th Grade - University
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
28 questions
Ser vs estar
Quiz
•
9th - 12th Grade
34 questions
Geometric Terms
Quiz
•
9th - 12th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
16 questions
Proportional Relationships And Constant Of Proportionality
Quiz
•
7th - 12th Grade
10 questions
DNA Replication Concepts and Mechanisms
Interactive video
•
7th - 12th Grade
10 questions
Unit 2: LS.Bio.1.5-LS.Bio.2.2 Power Vocab
Quiz
•
9th - 12th Grade
20 questions
Food Chains and Food Webs
Quiz
•
7th - 12th Grade
15 questions
Identify Triangle Congruence Criteria
Quiz
•
9th - 12th Grade
