Search Header Logo

Cryptography and Cybersecurity

Authored by Steven Hahn

10th - 12th Grade

CCSS covered

Used 1+ times

Cryptography and Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A symmetric algorithm used to encrypt data and provide confidentiality. It was originally designed as a replacement for DES. It uses multiple keys and multiple passes and is not as efficient as AES, but is still used in some applications, such as when hardware doesn’t support AES.

3DES

SHA256

MD5

RC4

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A symmetric algorithm used to encrypt data and provide confidentiality. It is quick, highly secure, and used in a wide assortment of cryptography schemes. It includes key sizes of 128 bits, 192 bits, or 256 bits.

DES

AES

RC4

MD5

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tony and Steve decide to encrypt their communication using an asymmetric encryption algorithm. Which one is the following would be the best to use while meeting their specifications?

AES with a 256 bit key

DES

RSA

Blowfish

Twofish

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ann wants to use cryptography to protect passwords for a new web-based tool that is being developed. Shw chooses an algorithm that uses a fixed-length output that is not reversible. Which algorithm might she have chosen?

SHA-256

CCMP

DES

3DES

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gene is worried that if an attacker had rainbow tables available that they might be able to crack some of the passwords that have been hashed and stored on a server. Which of the following might render these rainbow table useless?

Retina scanner

Salting

MD5

Full disk encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bruce is setting up an 802.11ac network and wants to ensure the highest level of security. Which of theses options would be the best to meet his specifications?

WPA2 with TKIP

WPA2 with AES

WPA2 with SSL

WPS2 with MD5

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

In which type of encryption is the same key used to encrypt and decrypt data?

private
public
symmetric
asymmetric

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?