Garden State Cyber - Unit 4.2 - Quiz

Garden State Cyber - Unit 4.2 - Quiz

11 Qs

quiz-placeholder

Similar activities

TRAIL SPM SAINS KOMPUTER SET 1

TRAIL SPM SAINS KOMPUTER SET 1

KG - University

9 Qs

IIIPI TEMA5: SEGURIDAD EN REDES WIRELES

IIIPI TEMA5: SEGURIDAD EN REDES WIRELES

10th Grade

10 Qs

Level 1 - Wireless Networking

Level 1 - Wireless Networking

KG - University

10 Qs

Allison Great Depression Quiz

Allison Great Depression Quiz

KG - University

15 Qs

Quiz Booth 2

Quiz Booth 2

KG - University

10 Qs

Cryptography Quiz

Cryptography Quiz

5th Grade

15 Qs

Computer Networks and the Internet Quiz

Computer Networks and the Internet Quiz

7th Grade

10 Qs

Block Chain Quiz ( Sample)

Block Chain Quiz ( Sample)

Professional Development

9 Qs

Garden State Cyber - Unit 4.2 - Quiz

Garden State Cyber - Unit 4.2 - Quiz

Assessment

Quiz

others

Medium

Created by

Anthony DellaRosa

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Scrambling data so that it is unreadable to anyone except those who know the trick to decoding it is...
Cybersecurity
Coding
Cryptography
Hieroglyphics

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The data that has been encrypted is called...
Algorithm
Ciphertext
Plaintext
Code

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

This is a method of encryption in when the order of the letters is changed. Scytale cipher, in which a ribbon is wrapped around a cylinder is an example.
Transposition
Substitution
Hieroglyphics
Graphics

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A historic cipher in which the alphabet is shifted left or right a given number of spaces.
Julius Cipher
Caesar Cipher
Vigenere Cipher
Enigma Cipher

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A substitution cipher based on multiple alphabets and a system to switch between the them using a password. A table or chart is often used.
Julius Cipher
Caesar Cipher
Vigenere Cipher
Enigma Cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

This is a technique used to solve substitution ciphers based on commonly used letters and words.
frequency analysis
guess and check
polyalphabetic analysis
encryption analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Using the simplest Caesar cipher, decode the following ciphertext. DZCFS
STOCK
BRAIN
CYBER
TESLA

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?