Search Header Logo

IOC, Cryptographic and password attacks

Authored by Sophie Griffith

Computers

Professional Development

Used 1+ times

IOC, Cryptographic and password attacks
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What do attackers often target in cryptographic attacks?

The encryption key

The implementation of cryptography

The encryption algorithm

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a birthday attack based on?

The strength of the encryption key

The length of the plaintext

The probability of hash collisions

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which hashing algorithm was found to have vulnerabilities leading to hash collisions?

SHA-256

AES

MD5

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a downgrade attack?

Intercepting communication between devices

Forcing devices to use weaker encryption or no encryption at all

Cracking the encryption key

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is SSL stripping?

A method to strengthen SSL encryption

A technique to create hash collisions

A type of downgrade attack where an attacker intercepts communication and downgrades the connection to HTTP

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Plaintext is more secure than hashes


True

False

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What are hashes?

Fixed-length strings of text generated from variable-length inputs

Reversible text encryption methods

Variable-length strings of text generated from fixed-length inputs

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?