Cybersecurity Quiz

Cybersecurity Quiz

11th Grade

8 Qs

quiz-placeholder

Similar activities

everything bout meeee

everything bout meeee

11th Grade

11 Qs

Ciel's Happy Fun Time Quiz

Ciel's Happy Fun Time Quiz

9th Grade - University

10 Qs

Fractions

Fractions

KG - 12th Grade

8 Qs

Malware Quiz

Malware Quiz

11th Grade

12 Qs

High School Homeroom Quiz 1

High School Homeroom Quiz 1

9th - 12th Grade

8 Qs

Homeroom Quiz 17

Homeroom Quiz 17

6th - 12th Grade

7 Qs

The Hindi Quizizz!

The Hindi Quizizz!

KG - University

10 Qs

PMBoK - RISK MANAGEMENT

PMBoK - RISK MANAGEMENT

1st - 12th Grade

7 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Professional Development

11th Grade

Medium

Created by

Grit and Motivation

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called when two hashes are the same?

Mathematical Error

Overflow

Race Condition

Collision

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Birthday problem?

Considers the probability that in a set of N randomly chosen people, two people will have the same birthday

Considers the probability that in a set of N randomly chosen people, another person will share your birthday

Considers the probability that in a set of N uniformly chosen people, two people will have the same birthday

Considers the probability that in a set of N randomly chosen people, 50% of the people will have the same birthday

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are passwords typically stored within a database?

Hashed

Encrypted

Encoded

In Binary Format

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many characters long are MD5 hashes?

16

32

64

128

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute force attack?

Physically breaking into a secure repository to steal information

Attempting to randomly guess based on some probability what the right answer would be

Trying all possible combinations and permutations until the right guess works

Use a logarithmic algorithm to reduce the numbers of potential guesses before selecting from the options available

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hashing algorithm was first published in 1992 and had collisions verified in 1996?

MD1

MD3

MD5

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One way to help strengthen a hashed password to ______.

Use multiple passwords

Salt the password

Save passwords in a file

Encrypt passwords

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ______ attack is when a malicious actor is able to attack a system by using older version of software.

downgrade

prehistoric

pen and paper

precursory