Encryption - AQA A Level Computer Science

Quiz
•
Computers
•
11th - 12th Grade
•
Medium
Ralph Ellis
Used 244+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Definition of encryption
Using an algorithm and a key to convert message data into a form that is not understandable without that key.
A method of trying to find the plain text from the cipher text without the decryption key.
Process of turning legible text into gobbledygook.
Using an algorithm and a key to convert encrypted message data into its plain text equivalent.
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Definition of decryption
Using an algorithm and a key to convert message data into a form that is not understandable without that key.
A method of trying to find the plain text from the cipher text without the decryption key.
Process of turning legible text into gobbledygook.
Using an algorithm and a key to convert encrypted message data into its plain text equivalent.
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A Caesar cipher encrypts the plaintext Et tu, Brute into the ciphertext ix xy, fvyxi. What would the same cipher encrypt it was Greek to me into?
mx aew kviio xs qi
ny bfx lwjjp yt rj
ep swo cnaag pk ia
qb eia ozmms bw um
4.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
Why are Caesar ciphers so easy to crack?
There are only 25 possible 'shifts', so a brute force attack will easily find the key required.
Use of frequency analysis will be able to find common letters and words.
Each key is only used once.
The number of shifts is calculated from the number of characters in the plaintext.
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The Caesar cipher is an example of what type of cipher?
Substitution cipher
Transposition cipher
Public key encryption
Vernam cipher
6.
MULTIPLE SELECT QUESTION
20 sec • 1 pt
What are the conditions required for a Vernam cipher to be 100% mathematically secure?
The key is used only once, and then destroyed/
The key is made up of truly random characters/
The key must be made up of fewer characters than the plaintext message.
Different keys must be used to encrypt and decrypt a message.
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which Boolean operator is used to produce the cipher text from the plaintext and the key?
XOR
NOR
OR
NAND
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Encryption and Caesar Cipher Quiz

Quiz
•
9th - 12th Grade
10 questions
MIL Reviewer 1 - DepEd Common

Quiz
•
12th Grade
13 questions
1.3.1 - Encryption & Hashing

Quiz
•
8th - 12th Grade
10 questions
Cybersecurity Fundamentals Week 4 Quiz

Quiz
•
KG - University
10 questions
Exploring Ciphers

Quiz
•
11th Grade
15 questions
C1 Cryptography & Encryption

Quiz
•
11th Grade
10 questions
Error Detection Methods of Data Tranmission

Quiz
•
9th - 12th Grade
10 questions
Enkripsi kelas 8

Quiz
•
12th Grade
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
Discover more resources for Computers
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
40 questions
LSHS Student Handbook Review: Pages 7-9

Quiz
•
11th Grade
20 questions
Scalars, Vectors & Graphs

Quiz
•
11th Grade
62 questions
Spanish Speaking Countries, Capitals, and Locations

Quiz
•
9th - 12th Grade
10 questions
Solving Equations Opener

Quiz
•
11th Grade
20 questions
First Day of School

Quiz
•
6th - 12th Grade
6 questions
Maier - AMDM - Unit 1 - Quiz 1 - Estimation

Quiz
•
12th Grade