Search Header Logo

Cryptography

Authored by Ron F.

Computers

12th Grade

Used 4+ times

Cryptography
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which strategy uses many layers of security mechanisms to frustrate attackers?

defense in depth
single layer security
encryption
decryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Cryptography is roughly translated to what?

secret writing
secret codes
secret language
secret ciphers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A cipher converts plain text into ___.

ciphertext
cleartext
keytext
randomtext

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the process of making text secret called?

decryption
encryption
substitution
permutation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Julius Caesar used a cipher known as ___.

columnar cipher
Caesar cipher
enigma cipher
rotor cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Substitution ciphers replace each letter in a message with ___.

something else according to a translation
the next letter in the alphabet
a number
the same letter

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The main drawback of basic substitution ciphers is that ___.

letter frequencies are preserved
they are too complex
they change letter frequencies
they require no key

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?