ap comp science unit 4 test

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A coffee shop is considering accepting orders and payments through their phone app and have decided to encrypt their customers' credit card information. Is this a secure form of payment?

Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.

Which of the following scenarios is most characteristic of a phishing attack.

You get an email from the IT support desk that asks you to send a reply email with your username and password to verify your account

What is 45 mod 45?

0

What is 28 mod 3?

1

Pick the expression involving the Modulo operation that computes to the exact same value as 9 MOD 8

1 mod 16

Pick the expressions involving the Modulo operation that compute to the exact same value

1 mod 16 9 mod 8

What is 175 mod 15?

10

What is 12 mod 10?

2

What is 17 mod 7?

3

Choose the answer that is NOT a feature of Public Key Cryptography:

A Public Key database ensures 3rd party accountability of security

When storing data digitally, whether through cloud computing or locally, there is an increased risk of theft due to the relative ease of accessing the information. Which of the following is NOT an example of security and privacy concerns that arise from storing data digitally?

A manager looks up an employee's birthday in the online company directory in order to plan a surprise birthday party for them at the office.

What is a Distributed Denial of Service (DDoS) attack?

An attempt to compromise a single target by flooding it with requests from multiple systems.

Which of the following is LEAST likely to indicate a phishing attack?

An email from your bank asks you to call the number on your card to verify a transaction.

Consider the two cryptography representations below when answering the question. These drawings depict two fundamental cryptographic concepts. Which of the choices below properly identify these concepts?

Asymmetric and Symmetric

Which of the following are true about Symmetric Key Encryption? I: The same key is used for both encryption and decryption II: The sender and receiver must exchange a shared key in private before using symmetric key encryption to communicate III: Symmetric key encryption is the most common form of encryption for internet communication

I and II only

Which of the following are true about Public Key Encryption? I: It requires all senders and receivers to have their own public key and their own private key II: A message encrypted with a person's public key can only be decrypted with the same person's private key III: A public key can be shared with anyone IV: Public key encryption is the most common form of encryption for internet communication

I and IV only

Which of the following are true statements about digital certificates in Web browsers? I. Digital certificates are used to verify the ownership of encrypted keys used in secured communication II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.

I only

Which of the following statements are true about Caesar's Cipher? I: Caesar's Cipher is a form of Symmetric Encryption II: Caesar's Cipher is a "hard" encryption to crack

I only

The digital landscape has made large datasets more accessible than they have ever been before. Data is the most valuable resource for researchers and the sheer amount of it is changing the way research is done. While big data is often seen as a positive, researchers must also be wary of some aspects of it. Which of the following are challenges for researchers working with big data? I. The collection of the data is more important than how researcher is going to use it. II. Because of the amounts of data present, many researchers look for trends that support their hypotheses rather than let the data lead them. III. Large data sets require special analytical tools (servers and other equipment) that some researchers may not have and/or may not realize they need to use. IV. New computational techniques are not keeping up with the growing number and size of data sets available. V. Large data sets usually come from multiple sources which means that collection techniques may have differed. A researcher not taking this into consideration may come to incorrect conclusions.

I, II, III, and V only

Which of the following most accurately describes Moore's Law?

Moore's Law is the observation that computing power tends to double every two years

Suppose that two people, Allison and Nate, want to send each other messages via the internet. Allison sends a message to Nate using no encryption other than Nate's public key. What is the most likely scenario?

Nate will be the only person able to read the message.

Bill receives an unsolicited email from an address that appears to be his bank. The email is asking Bill to verify his account information in a reply. The email looks legitimate and even has his bank's logo and address. Bill replies to the email with his account number and security information. The next day, Bill receives a call from his bank that his account has been closed and all of the funds have been withdrawn. Bill has been defrauded and is a victim of which email scam?

Phishing

Which of the following statements best describes the properties of public key encryption?

Public key encryption is an encryption method which relies on separate keys for encrypting and decrypting information.

Which of the following activities poses the greatest personal cybersecurity risk?

Purchasing a couch by emailing a credit card number to the couch owner

A city government is attempting to reduce the digital divide between groups with differing access to computing and the Internet. Which of the following actions is LEAST likely to be effective in this purpose?

Putting helpful tips for operating computers on the city government webs

Big data is more readily available today than it has ever been in the past. It is being created, accessed , and manipulated by professional and amateurs alike. Which of the following statements below accurately describes the relationship between reading data and updating data.

Reading data requires less storage than updating data.

Fill in the blank of the following statement: "_____ encryption is a method of encryption involving one key for both encryption and decryption."

Symmetric

Alice and Bob need to exchange some private data online. To do this, Alice create an algorithm what will encrypt and decrypt data. They secretly meet to share the algorithm. Then they each use the algorithm to encrypt their messages and decrypt each other's messages. What kind of encryption process is this?

Symmetric encryption

A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the programmer's choices in designing the structure of the system?

The frequency of a particular item occurring in a data set.

You are doing an internship with a network security firm, working with a team investigating a breach of a local bank's data center. During the meetings to discuss the possible methods that the hackers used to breach the system, many people have ideas. Which of the following are viable possibilities for the data breach?

The hackers used an exploit in the bank's online banking system to gain access to the data.

You are doing an internship with a network security firm, working with a team investigating a breach of a local bank's data center. During the meetings to discuss the possible methods that the hackers used to breach the system, many people have ideas. Which of the following are viable possibilities for the data breach?

The hackers utilized a form of social engineering to trick a bank employee into giving them login information to the bank's mainframe.

A powerful hurricane hit the coast of Alabama. In order to better analyze the situation, tweets sent by people in the state of Alabama during the brunt of the storm were accumulated and stored in a large database. The next day, meteorologist used this data to analyze the strength of the hurricane. After analysis of the tweets, the meteorologist concluded that the storm was fairly weak. However, this did not coincide with the devastating aftermath of the storm captured by their cameramen. Which of the following would be the MOST likely explanation for the discrepancy between the tweets and the video footage?

The hurricane disrupted cell service for those people affected most during the brunt of the storm.

A powerful hurricane hit the coast of Alabama. In order to better analyze the situation, tweets sent by people in the state of Alabama during the brunt of the storm were accumulated and stored in a large database. The next day, meteorologist used this data to analyze the strength of the hurricane. After analysis of the tweets, the meteorologist concluded that the storm was fairly weak. However, this did not coincide with the devastating aftermath of the storm captured by their cameramen. Which of the following would be the MOST likely explanation for the discrepancy between the tweets and the video footage?

The people with the most damage were preoccupied during the brunt of the store, so tweeting was not a high priority for them at the time.


Ensembles d'études connexes

English B1 2015 CommuVoc 1 (Sentence), English B1 2016 CommuVoc 2.01-2.40 (Definition), English B1 2016 CommuVoc 2.01-2.40 (Translation)

View Set

Suggested questions from a prior class...

View Set

Our Eyes Were Watching God - Chapters 7-11 Questions

View Set

(Ch.23) Facility Design, Layout, and Organization

View Set

ATI Pharmacology Practice Test A (2019)

View Set

Chapter 14 Test Review- World History

View Set

Paralegal Civil Service Exam Study Guide

View Set