Cryptography

Cryptography

9th - 12th Grade

5 Qs

quiz-placeholder

Similar activities

Encryption

Encryption

10th Grade

10 Qs

iGCSE Cryptography (2023 onwards)

iGCSE Cryptography (2023 onwards)

9th Grade - University

10 Qs

Y9.U1.Craking the code - quiz

Y9.U1.Craking the code - quiz

9th Grade

10 Qs

Encryption 2

Encryption 2

8th - 10th Grade

10 Qs

Khan Academy Cryptography

Khan Academy Cryptography

9th - 12th Grade

10 Qs

Computer Security:Encryption

Computer Security:Encryption

10th Grade - University

10 Qs

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

OCR A Level Computer Science (H446) - Component 1.3.1 - Compression, Encryption and Hashing

11th Grade - University

9 Qs

KEAMANAN JARINGAN

KEAMANAN JARINGAN

11th Grade

10 Qs

Cryptography

Cryptography

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the strategy employed by system architects to frustrate attackers and enhance computer security?

Encryption

Defence in depth

Substitution ciphers

Columnar transposition ciphers

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the biggest drawback of basic substitution ciphers?

They preserve letter frequencies

They are difficult to decode

They require a complex algorithm

They are easy to break

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the process called when text is made secret using a cipher?

Decryption

Encryption

Substitution

Permutation

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the name of the encryption technique that uses a series of substitutions and permutations based on the key value?

Caesar cipher

Data Encryption Standard

Advanced Encryption Standard

Diffie-Hellman Key Exchange

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What does the little padlock icon on a secure website indicate?

The server's public key

Symmetric encryption

Key exchange

Public key cryptography