Advanced Cryptography

Advanced Cryptography

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Debugging Challenge 2

Debugging Challenge 2

7th - 12th Grade

15 Qs

Getting Started With PowerPoint

Getting Started With PowerPoint

9th Grade

15 Qs

Understanding Compilers and Their Functions

Understanding Compilers and Their Functions

11th Grade

15 Qs

User Interface Design - Topic 1

User Interface Design - Topic 1

12th Grade

15 Qs

3rd week g9 summative

3rd week g9 summative

7th - 12th Grade

15 Qs

RDBMS ΒΑΣΕΙΣ ΔΕΔΟΜΕΝΩΝ Γ ΕΠΑΛ

RDBMS ΒΑΣΕΙΣ ΔΕΔΟΜΕΝΩΝ Γ ΕΠΑΛ

11th - 12th Grade

20 Qs

FNaF1

FNaF1

4th - 12th Grade

19 Qs

ICT

ICT

1st Grade - University

20 Qs

Advanced Cryptography

Advanced Cryptography

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Robert Harris

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Rail Fence Cipher is a cipher that uses columns. The plaintext is written downwards and starts a new column when the bottom is reached. This technique used in the Rail Fence Cipher is an example of:

a product cipher

a stream cipher

substitution

transposition

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Evaluate the following modulo math problem.

20 + (35 mod 11)

3

20

22

26

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Protecting data by hashing the data with a hashing function addresses which part(s) of the CIA triad?

Confidentiality only

Integrity Only

Availability only

Confidentiality and Integrity

Confidentiality and Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A primary requirement for a good cryptographic hash function is that the function should not have collisions. A collision in a hash function is when:

there are few inputs, but a lot of outputs.

two inputs map to the same output

two outputs come from the same input

there are few outputs, but a lot of inputs

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hash function takes an input of any length and converts it into an output of a fixed length. What term is used for this output?

field

password

digest

message

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would be the most secure method when storing passwords in a database?

Passwords are hashed

Passwords are saved as plaintext.

Passwords are both salted and hashed.

Passwords are encrypted using an algorithm.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the name for the issuer of an SSL certificate?

a certificate issuer

a certificate authority

a root authority

a man in the middle

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?