Cybersecurity - Apply multiple methods of encryption to model the secure transmission of information.
Quiz by Nicholas Haugen
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
7 questions
Show answers
- Q1Which of the following is an encryption method used to secure the transmission of information?HTTPFTPSMTPSSL30s
- Q2Which of the following is NOT a method of encryption used to secure the transmission of information?TLSSSHVPNEmail30s
- Q3What is the process of converting plaintext into ciphertext called?CompressionEncryptionEncodingDecryption30s
- Q4Which of the following is an example of symmetric encryption?AESRSADiffie-HellmanSHA-25630s
- Q5Which of the following is an example of asymmetric encryption?DESBlowfishRSAAES30s
- Q6What is the process of converting ciphertext back into plaintext called?DecryptionCompressionEncodingEncryption30s
- Q7Which of the following encryption methods is used to secure online banking transactions?DNSHTTPFTPTLS30s