Advanced Cryptography

Advanced Cryptography

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Types of Computers

Types of Computers

10th Grade

20 Qs

แบบทดสอบบทที่ 1 เรื่อง ข้อมูลมีคุณค่า ม.5

แบบทดสอบบทที่ 1 เรื่อง ข้อมูลมีคุณค่า ม.5

10th Grade

20 Qs

Computer Science - X

Computer Science - X

8th - 10th Grade

20 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

CCEA Digital Technology Chapter 14 Multimedia Applications

CCEA Digital Technology Chapter 14 Multimedia Applications

11th Grade

20 Qs

Quiz1_12&11_2t_20214

Quiz1_12&11_2t_20214

12th Grade

20 Qs

Google

Google

7th - 12th Grade

20 Qs

Lecture Exercise Topic 1.3

Lecture Exercise Topic 1.3

12th Grade

21 Qs

Advanced Cryptography

Advanced Cryptography

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Medium

Created by

Robert Harris

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Rail Fence Cipher is a cipher that uses columns. The plaintext is written downwards and starts a new column when the bottom is reached. This technique used in the Rail Fence Cipher is an example of:

a product cipher

a stream cipher

substitution

transposition

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Evaluate the following modulo math problem.

20 + (35 mod 11)

3

20

22

26

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Protecting data by hashing the data with a hashing function addresses which part(s) of the CIA triad?

Confidentiality only

Integrity Only

Availability only

Confidentiality and Integrity

Confidentiality and Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A primary requirement for a good cryptographic hash function is that the function should not have collisions. A collision in a hash function is when:

there are few inputs, but a lot of outputs.

two inputs map to the same output

two outputs come from the same input

there are few outputs, but a lot of inputs

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hash function takes an input of any length and converts it into an output of a fixed length. What term is used for this output?

field

password

digest

message

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would be the most secure method when storing passwords in a database?

Passwords are hashed

Passwords are saved as plaintext.

Passwords are both salted and hashed.

Passwords are encrypted using an algorithm.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the name for the issuer of an SSL certificate?

a certificate issuer

a certificate authority

a root authority

a man in the middle

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?