Cryptographic Attacks Quiz

Cryptographic Attacks Quiz

11th Grade

8 Qs

quiz-placeholder

Similar activities

Ethical Hacking 1

Ethical Hacking 1

11th - 12th Grade

10 Qs

CPU and Systems Software

CPU and Systems Software

10th - 11th Grade

11 Qs

social engineering

social engineering

1st Grade - Professional Development

10 Qs

8.3 Security of data (2)

8.3 Security of data (2)

9th - 12th Grade

13 Qs

Cybersecurity Quiz

Cybersecurity Quiz

11th Grade

12 Qs

BTEC DIT C3 LAB - Security Policies & Disaster Recovery

BTEC DIT C3 LAB - Security Policies & Disaster Recovery

10th - 11th Grade

10 Qs

Bảo mật mạng

Bảo mật mạng

11th Grade

10 Qs

Vocabulary Review Unit 4

Vocabulary Review Unit 4

9th - 12th Grade

12 Qs

Cryptographic Attacks Quiz

Cryptographic Attacks Quiz

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Grit and Motivation

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called when two hashes are the same?

Mathematical Error

Overflow

Race Condition

Collision

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Birthday problem?

Considers the probability that in a set of N randomly chosen people, two people will have the same birthday

Considers the probability that in a set of N randomly chosen people, another person will share your birthday

Considers the probability that in a set of N uniformly chosen people, two people will have the same birthday

Considers the probability that in a set of N randomly chosen people, 50% of the people will have the same birthday

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are passwords typically stored within a database?

Hashed

Encrypted

Encoded

In Binary Format

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many characters long are MD5 hashes?

16

32

64

128

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute force attack?

Physically breaking into a secure repository to steal information

Attempting to randomly guess based on some probability what the right answer would be

Trying all possible combinations and permutations until the right guess works

Use a logarithmic algorithm to reduce the numbers of potential guesses before selecting from the options available

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hashing algorithm was first published in 1992 and had collisions verified in 1996?

MD1

MD3

MD5

MD7

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One way to help strengthen a hashed password to _______.

Use multiple passwords

Salt the password

Save passwords in a file

Encrypt passwords

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ______ attack is when a malicious actor is able to attack a system by using older version of software.

downgrade

prehistoric

pen and paper

precursory