Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

quiz-placeholder

Similar activities

Cryptography

Cryptography

6th Grade - University

15 Qs

Cryptography

Cryptography

University

15 Qs

Cryptology

Cryptology

9th Grade - University

15 Qs

Cross-Site Scripting

Cross-Site Scripting

University

10 Qs

Chapter 6 (Fundamentals of Cybersecurity

Chapter 6 (Fundamentals of Cybersecurity

University

10 Qs

Cross-Site Scripting

Cross-Site Scripting

University

10 Qs

Cross Site Scripting

Cross Site Scripting

University

10 Qs

Chapter 10: Encryption Techniques

Chapter 10: Encryption Techniques

University

10 Qs

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

Assessment

Quiz

Computers

University

Medium

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute-force attack in cryptography?

An attack that uses mathematical formulas to decrypt data.

An attack that involves trying all possible keys to decrypt the data.

An attack that involves manipulating the key during encryption.

An attack that exploits weak encryption algorithms.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of attack that tries to discover the encryption key by analyzing patterns in ciphertext?

  • Birthday attack

Dictionary attack

  • Ciphertext-only attack

Man-in-the-middle attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves intercepting and altering the communication between two parties without their knowledge?

Brute-force attack

Replay attack

Man-in-the-middle attack

Side-channel attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cryptographic attack that exploits weaknesses in a hash function to produce two different messages with the same hash value is called what?

Collision attack

Birthday attack

Chosen-plaintext attack

Differential attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of cryptographic attack does the attacker have access to both the plaintext and its corresponding ciphertext?

Known-plaintext attack

Chosen-ciphertext attack

Chosen-plaintext attack

Ciphertext-only attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves flooding a target with excessive traffic, causing a denial of service?

SQL Injection

Denial of Service (DoS)

Cross-Site Scripting (XSS)

Buffer Overflow

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack targets a vulnerability in web applications that allows attackers to execute malicious SQL statements?

Cross-Site Request Forgery (CSRF)

Cross-Site Scripting (XSS)

Directory Traversal

SQL Injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?