Unit 1

Unit 1

University

5 Qs

quiz-placeholder

Similar activities

TAC3121-Quiz 5

TAC3121-Quiz 5

University

10 Qs

Assignment6

Assignment6

University

10 Qs

ITBP301_Chapter 02

ITBP301_Chapter 02

University

10 Qs

TAC3121-Quiz 3

TAC3121-Quiz 3

University

10 Qs

Chapter 10: Encryption Techniques

Chapter 10: Encryption Techniques

University

10 Qs

Kriptografi

Kriptografi

University

10 Qs

IAS 2 Quiz 1 Part 2

IAS 2 Quiz 1 Part 2

University

10 Qs

cybercrypt

cybercrypt

University

10 Qs

Unit 1

Unit 1

Assessment

Quiz

Computers

University

Hard

Created by

Antony Kumar K

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In brute force attack, on average half of all possible keys must be tried to achieve success

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If the sender and receiver use different keys, the system is referred to as conventional cipher system

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Use Caesar’s Cipher to decipher the following HQFUBSWHG WHAW

ABANDONED LOCK

ENCRYPTED TEXT

ABANDONED TEX

ENCRYPTED LOCK

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which are the most frequently found letters in the English language ?

e,a

e,o

e,t

e,i

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose from among the following cipher systems, from best to the worst, with respect to ease of decryption using frequency analysis.

Random Polyalphabetic, Plaintext, Playfair

Random Polyalphabetic, Playfair, Vignere

Random Polyalphabetic, Vignere, Playfair, Plaintext

Random Polyalphabetic, Plaintext, Beaufort, Playfair