AP CSP - Cybersecurity and Encryption Concepts Vocab

AP CSP - Cybersecurity and Encryption Concepts Vocab

9th - 12th Grade

17 Qs

quiz-placeholder

Similar activities

014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

014_Key Exchange - CompTIA Security+ SY0-701 - 1.4

12th Grade - University

15 Qs

FoT Unit 10 Code.org Assessment

FoT Unit 10 Code.org Assessment

9th - 10th Grade

20 Qs

Module 6

Module 6

12th Grade

21 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

BTEC IT Revision Quiz 1 (various topics)

BTEC IT Revision Quiz 1 (various topics)

9th - 11th Grade

20 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

Y10 Midcourse Warm-up P1

Y10 Midcourse Warm-up P1

9th - 12th Grade

15 Qs

CSP 2.1.5 Secure Protocols

CSP 2.1.5 Secure Protocols

10th - 12th Grade

12 Qs

AP CSP - Cybersecurity and Encryption Concepts Vocab

AP CSP - Cybersecurity and Encryption Concepts Vocab

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Wayground Content

Used 2+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Keylogging

A type of malware that records every keystroke made by a user to steal sensitive information.

A software that enhances keyboard performance and speed.

A security feature that prevents unauthorized access to a computer.

A tool used for monitoring network traffic and performance.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware

Malicious software designed to harm or exploit computers and systems.

A type of hardware used for data storage.

A software that enhances computer performance.

A program that protects against viruses.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Asymmetric Encryption

An encryption method using two keys—a public key for encryption and a private key for decryption.

An encryption method that uses a single key for both encryption and decryption.

A method of encryption that relies on symmetric keys only.

An encryption technique that does not require any keys.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption

The process of encoding data to prevent unauthorized access.

A method of compressing data to save space.

A technique for improving data retrieval speed.

A way to delete data permanently.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DDoS (Distributed Denial of Service) Attack

A cyber attack that floods a website or network with excessive traffic, making it unavailable.

A method to enhance website performance by distributing traffic.

A security protocol to protect against unauthorized access.

A type of malware that infects computers to steal data.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Public Key Encryption

A symmetric encryption technique using the same key for encryption and decryption.

An asymmetric encryption technique using different keys for encryption and decryption.

A method of encrypting data using a single key for both encryption and decryption.

A technique that uses multiple keys for a single encryption process.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Creative Commons

A type of copyright that restricts sharing and remixing.

An alternative to copyright that allows people to declare how they want their artistic creations to be shared or remixed.

A legal term for public domain works.

A licensing agreement for commercial use of art.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?