APCSP IOC-2.B Cybersecurity and Encryption

Quiz
•
Computers
•
9th - 12th Grade
•
Medium

Beckie Lee
Used 9+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of implementing authentication measures like strong passwords and MFA?
To speed up device performance.
To protect devices and information from unauthorized access.
To encrypt data during transmission.
To ensure regular software updates are installed.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following passwords best fits the description of a "strong password" (easy for the user to remember, difficult for others to guess based on knowledge of the user)?
password123
The user's own street name (mapleStreet)
A random string like X7$gP@!zQw (potentially hard for the user to remember)
An unusual phrase known only to the user like 3PurpleElephantsFly@Midnight!
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Multifactor Authentication (MFA) requires evidence from typically at least two of three categories. Which of the following correctly lists these three categories?
Knowledge (know), Possession (have), Inherence (are)
Location (where), Time (when), Action (do)
Public Key (encrypt), Private Key (decrypt), Symmetric Key (both)
Hardware (physical), Software (program), Network (connection)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user logs into their bank account by entering a password and then entering a code sent to their registered mobile phone. How does this process align with the definition of MFA?
It uses only one factor (knowledge - the password).
It successfully uses two factors: knowledge (password) and possession (phone).
It uses two factors: knowledge (password) and inherence (fingerprint).
It is not MFA because it only involves two steps.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does Multifactor Authentication enhance security compared to using only a strong password?
It makes the password itself harder to guess.
It encrypts the password during transmission.
It adds at least one additional layer of security that must be compromised.
It automatically updates the user's password regularly.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the fundamental difference between encryption and decryption?
Encryption encodes data to prevent unauthorized access; decryption decodes it.
Encryption uses public keys; decryption uses private keys.
Encryption protects data at rest; decryption protects data in transit.
Encryption requires MFA; decryption does not.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In symmetric key encryption, how many keys are required for secure communication between two parties (Alice and Bob)?
One shared key used by both Alice and Bob.
Two keys: Alice's public key and Bob's private key.
Two keys: Alice's private key and Bob's public key.
Four keys: A public/private pair for Alice and a public/private pair for Bob.
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
6.1 Data Security Cambridge iAS 9618

Quiz
•
11th Grade
16 questions
J277 1.5.2 - Utility Software

Quiz
•
9th - 11th Grade
20 questions
AP CSP - VOCABULARY QUIZS

Quiz
•
9th Grade
20 questions
Memory Injections – CompTIA Security+ SY0-701 – 2.3

Quiz
•
9th - 12th Grade
15 questions
network security

Quiz
•
9th Grade
20 questions
Cybersecurity - Review for Exam

Quiz
•
9th - 12th Grade
17 questions
C A+ U11

Quiz
•
9th Grade
20 questions
Network Security Quiz

Quiz
•
9th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
Proper Keyboarding Techniques

Interactive video
•
6th - 10th Grade
14 questions
Inputs and Outputs: Computer Science Intro

Lesson
•
5th - 9th Grade
10 questions
Understanding Computers: Hardware, Software, and Operating Systems

Interactive video
•
7th - 12th Grade
29 questions
AP CSP Unit 2 Review (Code.org)

Quiz
•
10th - 12th Grade