Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

University

10 Qs

ITBP301_Chapter 02

ITBP301_Chapter 02

University

10 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Physical Security

Physical Security

1st Grade - University

10 Qs

Lesson 2 - Passing Data to Subsystems

Lesson 2 - Passing Data to Subsystems

University

10 Qs

Identifying Security Threats and Vulnerabilities

Identifying Security Threats and Vulnerabilities

University

10 Qs

FCS Quiz-1

FCS Quiz-1

University

12 Qs

Basic Cyber Security II

Basic Cyber Security II

University

10 Qs

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

Assessment

Quiz

Computers

University

Practice Problem

Medium

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute-force attack in cryptography?

An attack that uses mathematical formulas to decrypt data.

An attack that involves trying all possible keys to decrypt the data.

An attack that involves manipulating the key during encryption.

An attack that exploits weak encryption algorithms.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of attack that tries to discover the encryption key by analyzing patterns in ciphertext?

  • Birthday attack

Dictionary attack

  • Ciphertext-only attack

Man-in-the-middle attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves intercepting and altering the communication between two parties without their knowledge?

Brute-force attack

Replay attack

Man-in-the-middle attack

Side-channel attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cryptographic attack that exploits weaknesses in a hash function to produce two different messages with the same hash value is called what?

Collision attack

Birthday attack

Chosen-plaintext attack

Differential attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of cryptographic attack does the attacker have access to both the plaintext and its corresponding ciphertext?

Known-plaintext attack

Chosen-ciphertext attack

Chosen-plaintext attack

Ciphertext-only attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves flooding a target with excessive traffic, causing a denial of service?

SQL Injection

Denial of Service (DoS)

Cross-Site Scripting (XSS)

Buffer Overflow

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack targets a vulnerability in web applications that allows attackers to execute malicious SQL statements?

Cross-Site Request Forgery (CSRF)

Cross-Site Scripting (XSS)

Directory Traversal

SQL Injection

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?