
Cryptographic Attacks

Interactive Video
•
Computers
•
9th - 12th Grade
•
Hard
Jordan Macurak
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary focus of cryptographic attacks when the attacker doesn't have the encryption key?
To find the encryption key through brute force.
To break the cryptography itself.
To intercept the encrypted data during transmission.
To guess the combination to the safe.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the approximate chance of two students sharing a birthday in a classroom of 23 students?
About 10%
About 25%
About 50%
About 75%
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the digital world, what is a hash collision?
When two different plaintexts produce the same hash value.
When an attacker uses brute force to find a key.
When an encryption algorithm fails to encrypt data.
When a single plaintext produces multiple hash values.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When were collisions first identified in the MD5 hash algorithm?
April 1992
1996
December 2008
After 2010
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of a downgrade attack?
To force systems to use stronger encryption.
To prevent any communication between devices.
To force systems to use weaker or no encryption.
To steal physical hardware from a system.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack combines an on-path attack with a downgrade attack?
Man-in-the-middle attack
SSL stripping
Denial-of-service attack
Phishing attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In an SSL stripping attack, what protocol is typically used for the initial request from the website visitor to the attacker?
HTTPS
FTP
HTTP
SSH
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What information is vulnerable to capture and modification by an attacker during an SSL stripping attack?
Only encrypted data between the attacker and the web server.
Only the initial HTTP request.
All subsequent communication between the website visitor and the attacker.
Only the web server's responses.
Similar Resources on Wayground
5 questions
On-path Attacks

Interactive video
•
9th - 12th Grade
11 questions
Network Security Concepts and Threats

Interactive video
•
9th - 12th Grade
2 questions
VOICED : Ocho detenidos relacionados con atentado de Tunez

Interactive video
•
9th - 12th Grade
11 questions
Understanding Malware Types

Interactive video
•
9th - 12th Grade
11 questions
Cybersecurity Threats and Prevention

Interactive video
•
10th - 12th Grade
2 questions
VOICED : Siete detenidos en relacion a atentado en Londres

Interactive video
•
9th - 12th Grade
6 questions
Zardari says cancer of terrorism will be eliminated

Interactive video
•
9th - 12th Grade
6 questions
Leon Trotsky's funeral in Mexico City in 1940

Interactive video
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
10 questions
1.2 OSI & TCP IP Models Quiz

Quiz
•
10th Grade
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
30 questions
Introduction to Computers

Quiz
•
8th - 9th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
20 questions
Hardware vs. Software Quiz

Quiz
•
7th - 10th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade