Law Enforcement, Cryptography & Cybercrime


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Which of the following terms refers to the act of making data unreadable to everyone besides those for whom the data is intended?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Cybercriminals may use cryptography to _____, or make unintelligible, any data that may be used as evidence against them after they have launched an attack.

2. Which of the following best defines cryptanalysis?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

Measure your comprehension of law enforcement, cryptography and cybercrime with this quiz and worksheet combo. Among other details, you should know whether movie streaming channels like Netflix and Hulu use encryption.

Quiz & Worksheet Goals

You'll be quizzed on the following:

  • When IOCA passed
  • Benefits of encryption
  • Whether Netflix and Hulu use encryption
  • How cryptography helps to enforce laws
  • Who issues IOCA-related warrants

Skills Practiced

  • Information recall - access the knowledge you've gained about IOCA
  • Knowledge application - use your knowledge to answer a question about how encryption is beneficial
  • Making connections - use what you've learned to make connections between cryptography and enforcing laws

Additional Learning

Explore this topic further by reviewing the lesson titled Law Enforcement, Cryptography & Cybercrime. Here's a snapshot of what it covers:

  • What advanced encryption prevents
  • How end-to-end encryption works
  • Examples of how encryption has been used