Cybersecurity Quiz

Cybersecurity Quiz

11th Grade

8 Qs

quiz-placeholder

Similar activities

Finding Pronoun and Antecedent ...

Finding Pronoun and Antecedent ...

KG - 11th Grade

10 Qs

WH QUESTIONS

WH QUESTIONS

1st Grade - University

10 Qs

Solid RTO WHS Policy Quiz

Solid RTO WHS Policy Quiz

11th Grade

10 Qs

maths for st thomas more

maths for st thomas more

6th Grade - Professional Development

13 Qs

D2D Session 4

D2D Session 4

6th - 12th Grade

9 Qs

Simple Past

Simple Past

4th Grade - Professional Development

8 Qs

The Cat in the Hat

The Cat in the Hat

KG - University

9 Qs

Our Monsters, Our Selves

Our Monsters, Our Selves

11th - 12th Grade

11 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Professional Development

11th Grade

Practice Problem

Medium

Created by

Grit and Motivation

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called when two hashes are the same?

Mathematical Error

Overflow

Race Condition

Collision

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Birthday problem?

Considers the probability that in a set of N randomly chosen people, two people will have the same birthday

Considers the probability that in a set of N randomly chosen people, another person will share your birthday

Considers the probability that in a set of N uniformly chosen people, two people will have the same birthday

Considers the probability that in a set of N randomly chosen people, 50% of the people will have the same birthday

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are passwords typically stored within a database?

Hashed

Encrypted

Encoded

In Binary Format

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many characters long are MD5 hashes?

16

32

64

128

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute force attack?

Physically breaking into a secure repository to steal information

Attempting to randomly guess based on some probability what the right answer would be

Trying all possible combinations and permutations until the right guess works

Use a logarithmic algorithm to reduce the numbers of potential guesses before selecting from the options available

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hashing algorithm was first published in 1992 and had collisions verified in 1996?

MD1

MD3

MD5

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One way to help strengthen a hashed password to ______.

Use multiple passwords

Salt the password

Save passwords in a file

Encrypt passwords

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ______ attack is when a malicious actor is able to attack a system by using older version of software.

downgrade

prehistoric

pen and paper

precursory