
Garden State Cyber - Unit 4.2 - Quiz
Authored by Anthony DellaRosa
others
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Scrambling data so that it is unreadable to anyone except those who know the trick to decoding it is...
Cybersecurity
Coding
Cryptography
Hieroglyphics
2.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
The data that has been encrypted is called...
Algorithm
Ciphertext
Plaintext
Code
3.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
This is a method of encryption in when the order of the letters is changed. Scytale cipher, in which a ribbon is wrapped around a cylinder is an example.
Transposition
Substitution
Hieroglyphics
Graphics
4.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
A historic cipher in which the alphabet is shifted left or right a given number of spaces.
Julius Cipher
Caesar Cipher
Vigenere Cipher
Enigma Cipher
5.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
A substitution cipher based on multiple alphabets and a system to switch between the them using a password. A table or chart is often used.
Julius Cipher
Caesar Cipher
Vigenere Cipher
Enigma Cipher
6.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
This is a technique used to solve substitution ciphers based on commonly used letters and words.
frequency analysis
guess and check
polyalphabetic analysis
encryption analysis
7.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Using the simplest Caesar cipher, decode the following ciphertext. DZCFS
STOCK
BRAIN
CYBER
TESLA
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?