Encryption, Compression & Hashing
Quiz
•
Computers
•
12th Grade
•
Hard
Matthew Barrow
Used 21+ times
FREE Resource
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of encryption
Using an algorithm and a key to convert message data into a form that is not understandable without that key.
A method of trying to find the plain text from the cipher text without the decryption key.
Process of turning legible text into gobbledygook.
Using an algorithm and a key to convert encrypted message data into its plain text equivalent.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of decryption
Using an algorithm and a key to convert message data into a form that is not understandable without that key.
A method of trying to find the plain text from the cipher text without the decryption key.
Process of turning legible text into gobbledygook.
Using an algorithm and a key to convert encrypted message data into its plain text equivalent.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Caesar cipher encrypts the plaintext Et tu, Brute into the ciphertext ix xy, fvyxi. What would the same cipher encrypt it was Greek to me into?
mx aew kviio xs qi
ny bfx lwjjp yt rj
ep swo cnaag pk ia
qb eia ozmms bw um
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Why are Caesar ciphers so easy to crack?
There are only 25 possible 'shifts', so a brute force attack will easily find the key required.
Use of frequency analysis will be able to find common letters and words.
Each key is only used once.
The number of shifts is calculated from the number of characters in the plaintext.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Caesar cipher is an example of what type of cipher?
Substitution cipher
Transposition cipher
Public key encryption
Vernam cipher
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are the conditions required for a Vernam cipher to be 100% mathematically secure?
The key is used only once, and then destroyed/
The key is made up of truly random characters/
The key must be made up of fewer characters than the plaintext message.
Different keys must be used to encrypt and decrypt a message.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Boolean operator is used to produce the cipher text from the plaintext and the key?
XOR
NOR
OR
NAND
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
15 questions
Lesson 9
Quiz
•
11th Grade - University
20 questions
System and network support and management
Quiz
•
11th Grade - Professi...
17 questions
Email Lớp 6
Quiz
•
6th Grade - University
17 questions
Network Topologies & Malware
Quiz
•
6th - 12th Grade
18 questions
Networks
Quiz
•
8th - 12th Grade
20 questions
KISI KISI STS 2 INFORMATIKA KLS 7
Quiz
•
7th Grade - University
20 questions
แบบทดสอบปลายภาค Photoshop
Quiz
•
9th - 12th Grade
15 questions
1.1 Computer Systems Essential Knowledge
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
