Advanced Cryptography

Advanced Cryptography

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

CSP Vocab Review 3

CSP Vocab Review 3

10th - 12th Grade

19 Qs

Security Fundamentals

Security Fundamentals

10th - 12th Grade

23 Qs

security best practices

security best practices

10th Grade - University

20 Qs

A level Encryption

A level Encryption

12th Grade

16 Qs

Encryption and Security Concepts

Encryption and Security Concepts

12th Grade

17 Qs

019_Certificates - CompTIA Security+ SY0-701 - 1.4

019_Certificates - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

23 Qs

Intranet, cloud and general terms

Intranet, cloud and general terms

9th - 10th Grade

15 Qs

10.2 Effective use of the internet

10.2 Effective use of the internet

9th - 12th Grade

15 Qs

Advanced Cryptography

Advanced Cryptography

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Robert Harris

Used 7+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The Rail Fence Cipher is a cipher that uses columns. The plaintext is written downwards and starts a new column when the bottom is reached. This technique used in the Rail Fence Cipher is an example of:

a product cipher

a stream cipher

substitution

transposition

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Evaluate the following modulo math problem.

20 + (35 mod 11)

3

20

22

26

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Protecting data by hashing the data with a hashing function addresses which part(s) of the CIA triad?

Confidentiality only

Integrity Only

Availability only

Confidentiality and Integrity

Confidentiality and Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A primary requirement for a good cryptographic hash function is that the function should not have collisions. A collision in a hash function is when:

there are few inputs, but a lot of outputs.

two inputs map to the same output

two outputs come from the same input

there are few outputs, but a lot of inputs

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hash function takes an input of any length and converts it into an output of a fixed length. What term is used for this output?

field

password

digest

message

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would be the most secure method when storing passwords in a database?

Passwords are hashed

Passwords are saved as plaintext.

Passwords are both salted and hashed.

Passwords are encrypted using an algorithm.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the name for the issuer of an SSL certificate?

a certificate issuer

a certificate authority

a root authority

a man in the middle

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?