Cryptography and Cybersecurity

Cryptography and Cybersecurity

10th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Problem Solving : Design Solution

Problem Solving : Design Solution

12th Grade

15 Qs

Mobile app development principles

Mobile app development principles

10th Grade

17 Qs

Imagen GIMP

Imagen GIMP

9th - 12th Grade

15 Qs

MAC1_Un1-2

MAC1_Un1-2

12th Grade

20 Qs

Class XI Basics

Class XI Basics

11th - 12th Grade

15 Qs

ICT 10 Q4 M2 W3-4

ICT 10 Q4 M2 W3-4

10th Grade

16 Qs

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

CIA Mid-Term Review 1

CIA Mid-Term Review 1

9th - 10th Grade

17 Qs

Cryptography and Cybersecurity

Cryptography and Cybersecurity

Assessment

Quiz

10th - 12th Grade

Medium

CCSS
RI.9-10.4, RI.11-12.4, RI.7.4

+1

Standards-aligned

Created by

Steven Hahn

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A symmetric algorithm used to encrypt data and provide confidentiality. It was originally designed as a replacement for DES. It uses multiple keys and multiple passes and is not as efficient as AES, but is still used in some applications, such as when hardware doesn’t support AES.

3DES

SHA256

MD5

RC4

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A symmetric algorithm used to encrypt data and provide confidentiality. It is quick, highly secure, and used in a wide assortment of cryptography schemes. It includes key sizes of 128 bits, 192 bits, or 256 bits.

DES

AES

RC4

MD5

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tony and Steve decide to encrypt their communication using an asymmetric encryption algorithm. Which one is the following would be the best to use while meeting their specifications?

AES with a 256 bit key

DES

RSA

Blowfish

Twofish

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ann wants to use cryptography to protect passwords for a new web-based tool that is being developed. Shw chooses an algorithm that uses a fixed-length output that is not reversible. Which algorithm might she have chosen?

SHA-256

CCMP

DES

3DES

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gene is worried that if an attacker had rainbow tables available that they might be able to crack some of the passwords that have been hashed and stored on a server. Which of the following might render these rainbow table useless?

Retina scanner

Salting

MD5

Full disk encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bruce is setting up an 802.11ac network and wants to ensure the highest level of security. Which of theses options would be the best to meet his specifications?

WPA2 with TKIP

WPA2 with AES

WPA2 with SSL

WPS2 with MD5

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

In which type of encryption is the same key used to encrypt and decrypt data?

private
public
symmetric
asymmetric

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?