Encryption (Cambridge (CIE) IGCSE Computer Science): Exam Questions

Exam code: 0478 & 0984

14 mins4 questions
11 mark

State what is given to a device when it connects to a wireless network using the SSID and correct password.

15 marks

Complete the sentences about symmetric encryption.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

  • algorithm

  • cipher

  • copied

  • delete

  • key

  • plain

  • private

  • public

  • standard

  • stolen

  • understood

  • unreadable

The data before encryption is known as .................................................. text. To scramble the data, an encryption .................................................., which is a type of .................................................., is used.

The data after encryption is known as .................................................. text. Encryption prevents the data from being .................................................. by a hacker.

24 marks

Data is encrypted to keep it safe during transmission.

Complete the paragraph about asymmetric encryption.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

asymmetric  certificate  cipher text
decrypted  encrypted  parallel key  plain text  private key
protected  public key  serial key  symmetric

.............................................................. is encrypted into .............................................................. using a .............................................................. . The encrypted data is then transmitted from the sender to the receiver. The encrypted data is then decrypted using a .............................................................. .

14 marks

A company is setting up both wireless and wired networks for secure communication between employees. The IT team must ensure that all data transmitted across the networks is encrypted.

Describe how encryption protects data transmitted over wireless networks.

In your answer explain:

  • the role of the 'master key' in this process

  • the importance of not transmitting the master key