Cryptography Basics

Cryptography Basics

6th - 8th Grade

15 Qs

quiz-placeholder

Similar activities

Cryptography (Y8)

Cryptography (Y8)

7th - 9th Grade

17 Qs

Unit 1: Cryptograpy

Unit 1: Cryptograpy

8th Grade

14 Qs

Encryption 2

Encryption 2

8th - 10th Grade

10 Qs

Y8 Codes & codebreaking #1

Y8 Codes & codebreaking #1

8th Grade

10 Qs

Encryption

Encryption

6th Grade

13 Qs

Alan Turing Brainpop

Alan Turing Brainpop

5th - 8th Grade

10 Qs

HW: Week 2 - Cybersecurity - Alan Turing

HW: Week 2 - Cybersecurity - Alan Turing

6th - 8th Grade

10 Qs

Cryptography Basics

Cryptography Basics

6th - 8th Grade

15 Qs

Cryptography Basics

Cryptography Basics

Assessment

Quiz

Computers

6th - 8th Grade

Easy

Created by

Quizizz Content

Used 11+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptanalysis ,the study of the frequency of letters or groups of letters in a ciphertext. .s based on the fact that, in any given stretch of written language, certain letters and combinations of letters occur with varying frequencies.

brute force

CRIBS

frequency analysis

Morse Code

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword. It employs a form of polyalphabetic substitution.

Caesar cipher

Vignere

Key

brute force

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

the art of writing or solving codes.

decipher

brute force

key

cryptography

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

to decode or decipher.

cipher

enigma machine

brute force

decrypt

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many letters are in the alphabet?

20

26

27

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.[1]

Vigenere

Caesar Cipher

CRIBS

cryptography

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, an attacker submitting many passwords or passphrases with the hope of eventually guessing a combination

Turing

decrypt

brute force

key

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?