Cryptographic Attacks

Cryptographic Attacks

Assessment

Interactive Video

Computers

9th - 12th Grade

Hard

Created by

Jordan Macurak

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of cryptographic attacks when the attacker doesn't have the encryption key?

To find the encryption key through brute force.

To break the cryptography itself.

To intercept the encrypted data during transmission.

To guess the combination to the safe.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the approximate chance of two students sharing a birthday in a classroom of 23 students?

About 10%

About 25%

About 50%

About 75%

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the digital world, what is a hash collision?

When two different plaintexts produce the same hash value.

When an attacker uses brute force to find a key.

When an encryption algorithm fails to encrypt data.

When a single plaintext produces multiple hash values.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When were collisions first identified in the MD5 hash algorithm?

April 1992

1996

December 2008

After 2010

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a downgrade attack?

To force systems to use stronger encryption.

To prevent any communication between devices.

To force systems to use weaker or no encryption.

To steal physical hardware from a system.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack combines an on-path attack with a downgrade attack?

Man-in-the-middle attack

SSL stripping

Denial-of-service attack

Phishing attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an SSL stripping attack, what protocol is typically used for the initial request from the website visitor to the attacker?

HTTPS

FTP

HTTP

SSH

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What information is vulnerable to capture and modification by an attacker during an SSL stripping attack?

Only encrypted data between the attacker and the web server.

Only the initial HTTP request.

All subsequent communication between the website visitor and the attacker.

Only the web server's responses.