
IOC, Cryptographic and password attacks
Authored by Sophie Griffith
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What do attackers often target in cryptographic attacks?
The encryption key
The implementation of cryptography
The encryption algorithm
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is a birthday attack based on?
The strength of the encryption key
The length of the plaintext
The probability of hash collisions
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which hashing algorithm was found to have vulnerabilities leading to hash collisions?
SHA-256
AES
MD5
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is a downgrade attack?
Intercepting communication between devices
Forcing devices to use weaker encryption or no encryption at all
Cracking the encryption key
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is SSL stripping?
A method to strengthen SSL encryption
A technique to create hash collisions
A type of downgrade attack where an attacker intercepts communication and downgrades the connection to HTTP
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Plaintext is more secure than hashes
True
False
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What are hashes?
Fixed-length strings of text generated from variable-length inputs
Reversible text encryption methods
Variable-length strings of text generated from fixed-length inputs
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?