QCAA Digital Solutions Digital methods for exchanging data
5 sample questions with marking guides and sample answers · Avg. score: 100%
Which element of visual communication, if not used appropriately, could risk the accessibility of a digital system?
line
form
scale
shape
Asymmetric encryption algorithms
all use one key.
only use private keys.
have a block size of 64.
use different keys for encryption and decryption.
In an online silent auction, items are posted on a public website and participants post a secret bid on the items they would like to purchase. Bidders cannot see each other’s bids. The bidding period is 7 consecutive days.
At the end of the auction, all bid values are revealed on the website and the highest bidder pays the amount they posted to obtain the item.
Explain how checksums, encryption and authentication would improve the security of the data exchange in this scenario.
Recommend one encryption method to securely store auction data and justify your response.
Explain the features of two network transmission protocols for transferring data between websites.
A mobile application (app) allows car owners to remotely unlock their cars if they lock the keys inside or their keys malfunction. Once users have created an account, they can request a remote unlock by entering their username and password.
The user data that is required to set up an account includes:
- full name
- date of birth
- home address
- driver licence number
- vehicle make, model and colour
- vehicle registration.
Analyse the information and evaluate risks to data confidentiality, integrity and availability for this app. Justify your response with three examples.
Identify a relevant Australian Privacy Principle and explain an ethical consideration when using app data.
You discover that the app uses a Caesar cipher to encrypt data, allowing you to intercept a password in transit. Perform a desk check for five iterations to decrypt the password ‘KYIWW’.
A friend is interested in learning more about encryption. Use pseudocode to symbolise a simple Caesar cipher as a demonstration.