Encryption - AQA A Level Computer Science
Quiz
•
Computers
•
11th - 12th Grade
•
Practice Problem
•
Medium
Ralph Ellis
Used 257+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Definition of encryption
Using an algorithm and a key to convert message data into a form that is not understandable without that key.
A method of trying to find the plain text from the cipher text without the decryption key.
Process of turning legible text into gobbledygook.
Using an algorithm and a key to convert encrypted message data into its plain text equivalent.
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Definition of decryption
Using an algorithm and a key to convert message data into a form that is not understandable without that key.
A method of trying to find the plain text from the cipher text without the decryption key.
Process of turning legible text into gobbledygook.
Using an algorithm and a key to convert encrypted message data into its plain text equivalent.
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A Caesar cipher encrypts the plaintext Et tu, Brute into the ciphertext ix xy, fvyxi. What would the same cipher encrypt it was Greek to me into?
mx aew kviio xs qi
ny bfx lwjjp yt rj
ep swo cnaag pk ia
qb eia ozmms bw um
4.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
Why are Caesar ciphers so easy to crack?
There are only 25 possible 'shifts', so a brute force attack will easily find the key required.
Use of frequency analysis will be able to find common letters and words.
Each key is only used once.
The number of shifts is calculated from the number of characters in the plaintext.
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The Caesar cipher is an example of what type of cipher?
Substitution cipher
Transposition cipher
Public key encryption
Vernam cipher
6.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
What are the conditions required for a Vernam cipher to be 100% mathematically secure?
The key is used only once, and then destroyed/
The key is made up of truly random characters/
The key must be made up of fewer characters than the plaintext message.
Different keys must be used to encrypt and decrypt a message.
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which Boolean operator is used to produce the cipher text from the plaintext and the key?
XOR
NOR
OR
NAND
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Empowerment Technologies Quiz 2
Quiz
•
11th Grade
15 questions
PRUEBA CORTA I - SISTEMA E INSTALACIÓN DE SOFTWARE I - U4
Quiz
•
9th - 12th Grade
10 questions
Unit 4 Advanced AP CSP
Quiz
•
9th - 12th Grade
15 questions
After Effect Intoduction
Quiz
•
10th Grade - University
14 questions
Linux: Users and Groups
Quiz
•
9th Grade - University
10 questions
Inspire - AI Trivia
Quiz
•
11th Grade
15 questions
tik kelas 7
Quiz
•
1st Grade - University
10 questions
Parcial-Dibujo
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
