Classical Cryptography Challenge

Classical Cryptography Challenge

University

25 Qs

quiz-placeholder

Similar activities

Network + Domain 4: IT Security Concepts Quiz

Network + Domain 4: IT Security Concepts Quiz

University

25 Qs

Chapter 6: E-commerce & Social Informatics Quiz

Chapter 6: E-commerce & Social Informatics Quiz

University

20 Qs

Mid Exam

Mid Exam

12th Grade - University

20 Qs

ETHICS IN ICT SOCIETY

ETHICS IN ICT SOCIETY

University

20 Qs

Exploring Relational Data Concepts

Exploring Relational Data Concepts

University

30 Qs

Security Fundamental

Security Fundamental

University

20 Qs

Cybersecurity Essentials

Cybersecurity Essentials

University

20 Qs

Cyber Offences Quiz

Cyber Offences Quiz

University

20 Qs

Classical Cryptography Challenge

Classical Cryptography Challenge

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Usman Ali

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the key shift in a Caesar cipher if the key is 3?

3 positions diagonal in the alphabet

1 position forward in the alphabet

3 positions forward in the alphabet

3 positions backward in the alphabet

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cipher uses a keyword to determine the letter substitution?

Caesar cipher

Vigenère cipher

Transposition cipher

Substitution cipher

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a Vigenère cipher, what is the length of the repeating key if the key is 'KEY'?

5

4

3

2

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main characteristic of a Vernam cipher?

It encrypts data using a fixed key.

It uses a one-time pad for encryption.

It uses a symmetric key for encryption.

It relies on a public key infrastructure.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cipher is considered unbreakable when used correctly?

Caesar cipher

RSA encryption

Vigenère cipher

one-time pad

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a Playfair cipher, how are duplicate letters handled?

Duplicate letters in a digraph are handled by replacing the second letter with a filler letter, usually 'X'.

Duplicate letters are combined into a single letter.

Duplicate letters are ignored entirely.

Duplicate letters are replaced with the next letter in the alphabet.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary method of encryption in a Rail Fence cipher?

Zigzag pattern across multiple rails

Substitution of letters

Straight line encryption

Transposition of words

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)