Network Security - Module 15

Network Security - Module 15

Professional Development

9 Qs

quiz-placeholder

Similar activities

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Professional Development

12 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

Professional Development

10 Qs

Crytopgraphy

Crytopgraphy

9th Grade - Professional Development

10 Qs

Software Development Quiz

Software Development Quiz

6th Grade - Professional Development

10 Qs

CNS QUIZ

CNS QUIZ

Professional Development

10 Qs

Blockchain and Metaverse

Blockchain and Metaverse

University - Professional Development

10 Qs

Cybersecurity - CIA triad

Cybersecurity - CIA triad

Professional Development

10 Qs

Appreciation of ICT and 3D BIM

Appreciation of ICT and 3D BIM

Professional Development

12 Qs

Network Security - Module 15

Network Security - Module 15

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

Gary Martyn

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Cryptography?

The breaking of codes to reveal the hidden information within

The creation of codes to hide information from unauthorised eyes

The process of taking plaintext and obscuring it from view

The process of taking ciphertext and decoding it to plaintext

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does CIA stand for?

Confidentiality, Integrity, Accessibility

Confidentiality, Interrogation, Authentication

Confidentiality, Integrity, Authentication

Confidentiality, Interrogation, Accessibility

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Cryptanalysis?

The breaking of codes to reveal the hidden information within

The creation of codes to hide information from unauthorised eyes

The process of taking plaintext and obscuring it from view

The process of taking ciphertext and decoding it to plaintext

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a transposition cipher?

Caesar cipher

Scytale cipher

Vigenère cipher

Stream cipher

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cipher is Vigenère?

Polyaphabetic

One-time pad

Transposition

Basic substitution

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Roughly how long would it take a modern computer to 'brute-force' decode a Caesar cipher?

Less than 1 second

About an hour

About a day

About a year

Well over a year

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which "bit" lengths can AES keys be?

128

192

256

384

512

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Roughly how long would it take a modern computer to 'brute-force' decode an AES cipher?

Less than 1 second

About an hour

About a day

About a year

Well over a year

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who created the polyaphabetic cipher Vigenère?

Mary Queen of Scots

Blaise De Vigenère

Giovan Battista Bellaso

Charles Babbage