Encryption, Compression & Hashing
Quiz
•
Computers
•
12th Grade
•
Hard
Matthew Barrow
Used 25+ times
FREE Resource
Enhance your content in a minute
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of encryption
Using an algorithm and a key to convert message data into a form that is not understandable without that key.
A method of trying to find the plain text from the cipher text without the decryption key.
Process of turning legible text into gobbledygook.
Using an algorithm and a key to convert encrypted message data into its plain text equivalent.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of decryption
Using an algorithm and a key to convert message data into a form that is not understandable without that key.
A method of trying to find the plain text from the cipher text without the decryption key.
Process of turning legible text into gobbledygook.
Using an algorithm and a key to convert encrypted message data into its plain text equivalent.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Caesar cipher encrypts the plaintext Et tu, Brute into the ciphertext ix xy, fvyxi. What would the same cipher encrypt it was Greek to me into?
mx aew kviio xs qi
ny bfx lwjjp yt rj
ep swo cnaag pk ia
qb eia ozmms bw um
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Why are Caesar ciphers so easy to crack?
There are only 25 possible 'shifts', so a brute force attack will easily find the key required.
Use of frequency analysis will be able to find common letters and words.
Each key is only used once.
The number of shifts is calculated from the number of characters in the plaintext.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Caesar cipher is an example of what type of cipher?
Substitution cipher
Transposition cipher
Public key encryption
Vernam cipher
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are the conditions required for a Vernam cipher to be 100% mathematically secure?
The key is used only once, and then destroyed/
The key is made up of truly random characters/
The key must be made up of fewer characters than the plaintext message.
Different keys must be used to encrypt and decrypt a message.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Boolean operator is used to produce the cipher text from the plaintext and the key?
XOR
NOR
OR
NAND
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Linux-2 Quiz 2 -- LAMP
Quiz
•
1st - 12th Grade
20 questions
Name The Disney Animation Films
Quiz
•
KG - University
15 questions
Empowerment Technologies
Quiz
•
KG - 12th Grade
15 questions
Excel
Quiz
•
10th - 12th Grade
20 questions
Clean, Sanitize and Store Kitchen Tools and Equipment
Quiz
•
11th - 12th Grade
14 questions
Pre-test: On Online searching by Innovative Teaching Ideas)
Quiz
•
6th - 12th Grade
20 questions
Computer
Quiz
•
12th Grade
15 questions
Cyber Security KS4
Quiz
•
8th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
