Classical Cryptography Challenge

Classical Cryptography Challenge

University

25 Qs

quiz-placeholder

Similar activities

PPL (QUIZ 6) Memory Management Quiz

PPL (QUIZ 6) Memory Management Quiz

University

20 Qs

LogoNOVA (FYIT Logo Quiz)

LogoNOVA (FYIT Logo Quiz)

University

20 Qs

GEE-109 LIVING IN AN IT ERA

GEE-109 LIVING IN AN IT ERA

University

20 Qs

Understanding Linux File Permissions

Understanding Linux File Permissions

10th Grade - University

20 Qs

"Mahal kong NVSU" Quiz Bee

"Mahal kong NVSU" Quiz Bee

University

20 Qs

Introducción a la Ciberseguridad

Introducción a la Ciberseguridad

University

20 Qs

F10E Chapter 7: Information Systems and Management Quiz

F10E Chapter 7: Information Systems and Management Quiz

University

20 Qs

Internet and App script

Internet and App script

5th Grade - University

22 Qs

Classical Cryptography Challenge

Classical Cryptography Challenge

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Usman Ali

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the key shift in a Caesar cipher if the key is 3?

3 positions diagonal in the alphabet

1 position forward in the alphabet

3 positions forward in the alphabet

3 positions backward in the alphabet

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cipher uses a keyword to determine the letter substitution?

Caesar cipher

Vigenère cipher

Transposition cipher

Substitution cipher

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a Vigenère cipher, what is the length of the repeating key if the key is 'KEY'?

5

4

3

2

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main characteristic of a Vernam cipher?

It encrypts data using a fixed key.

It uses a one-time pad for encryption.

It uses a symmetric key for encryption.

It relies on a public key infrastructure.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cipher is considered unbreakable when used correctly?

Caesar cipher

RSA encryption

Vigenère cipher

one-time pad

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a Playfair cipher, how are duplicate letters handled?

Duplicate letters in a digraph are handled by replacing the second letter with a filler letter, usually 'X'.

Duplicate letters are combined into a single letter.

Duplicate letters are ignored entirely.

Duplicate letters are replaced with the next letter in the alphabet.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary method of encryption in a Rail Fence cipher?

Zigzag pattern across multiple rails

Substitution of letters

Straight line encryption

Transposition of words

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?