Cryptography and Cybersecurity

Cryptography and Cybersecurity

10th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Dystopian Quiz

Dystopian Quiz

5th Grade - Professional Development

16 Qs

GRILL SHELF LIFE

GRILL SHELF LIFE

1st - 12th Grade

16 Qs

Quiz despre Hardware si Memorie

Quiz despre Hardware si Memorie

9th Grade - University

20 Qs

7.3.1 Network Reconnaissance

7.3.1 Network Reconnaissance

12th Grade

15 Qs

Diagnóstico 6° Semestre (Ene - Jun 24)

Diagnóstico 6° Semestre (Ene - Jun 24)

12th Grade

16 Qs

Test 18 - Algortithms

Test 18 - Algortithms

9th - 10th Grade

17 Qs

Quiz by Shrey

Quiz by Shrey

5th Grade - University

20 Qs

Cryptography and Cybersecurity

Cryptography and Cybersecurity

Assessment

Quiz

10th - 12th Grade

Medium

CCSS
RI.9-10.4, RI.11-12.4, RI.7.4

+1

Standards-aligned

Created by

Steven Hahn

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A symmetric algorithm used to encrypt data and provide confidentiality. It was originally designed as a replacement for DES. It uses multiple keys and multiple passes and is not as efficient as AES, but is still used in some applications, such as when hardware doesn’t support AES.

3DES

SHA256

MD5

RC4

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A symmetric algorithm used to encrypt data and provide confidentiality. It is quick, highly secure, and used in a wide assortment of cryptography schemes. It includes key sizes of 128 bits, 192 bits, or 256 bits.

DES

AES

RC4

MD5

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tony and Steve decide to encrypt their communication using an asymmetric encryption algorithm. Which one is the following would be the best to use while meeting their specifications?

AES with a 256 bit key

DES

RSA

Blowfish

Twofish

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ann wants to use cryptography to protect passwords for a new web-based tool that is being developed. Shw chooses an algorithm that uses a fixed-length output that is not reversible. Which algorithm might she have chosen?

SHA-256

CCMP

DES

3DES

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gene is worried that if an attacker had rainbow tables available that they might be able to crack some of the passwords that have been hashed and stored on a server. Which of the following might render these rainbow table useless?

Retina scanner

Salting

MD5

Full disk encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bruce is setting up an 802.11ac network and wants to ensure the highest level of security. Which of theses options would be the best to meet his specifications?

WPA2 with TKIP

WPA2 with AES

WPA2 with SSL

WPS2 with MD5

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

In which type of encryption is the same key used to encrypt and decrypt data?

private
public
symmetric
asymmetric

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?