The ABC's of Cryptology Review

The ABC's of Cryptology Review

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Quiz 5: Internet safety, cyber security and encryption

Quiz 5: Internet safety, cyber security and encryption

7th - 8th Grade

11 Qs

Cryptography Basics

Cryptography Basics

6th - 8th Grade

15 Qs

Encryption

Encryption

6th Grade

13 Qs

Encryption 2

Encryption 2

8th - 10th Grade

10 Qs

CodeHS Crypto

CodeHS Crypto

7th - 9th Grade

13 Qs

Cryptography

Cryptography

7th - 9th Grade

13 Qs

Cipher Encryption

Cipher Encryption

6th - 8th Grade

7 Qs

Cryptography assessment

Cryptography assessment

8th - 9th Grade

12 Qs

The ABC's of Cryptology Review

The ABC's of Cryptology Review

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

Fabian Bowman

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption plays a crucial role in maintaining which part(s) of the CIA triad?

Confidentiality

Integrity and Aviailability

Confidentiality and Availability

Confidentiality and Integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encrypted information is only viewable by authorized users who have the correct key to decrypt.

Confidential

Integrity

Availability

Security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To decrypt an encrypted message, pass the encrypted message and the _____ to the decrypt function.

crytology

decrypted message

key

ciphertext

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The attacker knows that the Caesar cipher shifts each letter by a certain number, so they decide to try every possible key (shift) from 1 to 25.

Frequency analysis

Brute Force

Frequency distribution

Using a dictionary

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mason left his password screen open while passing out papers for class. Bryson sees this and changes the password locking Mason out of his Tictok. Bryson tells the class that Mason he encrypted the word "Password." Parker takes the Phone and unlocks it and then locks it again while telling Mason to figure it out on himself. What Method of code-breaking did Parker use?

Rainbow Table

Brute Force

Using a dictionary

Letter Frequency Analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary flaw with the Caesar Cipher and other substitution ciphers?

It could not be applied to all messages

With enough frequency, a message could be decryted

It could only be used in English

There were too many options when encrypting a message

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes the Vigenère Cipher resistant to being cracked with brute force and letter frequency analysis?

It uses a single fixed shift for all letters in the plaintext.

It substitutes each letter with a number instead of a letter.

It uses multiple shifts based on the keyword, making brute force and letter frequency analysis ineffective.

It only encrypts vowels, leaving consonants unchanged.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?