Cryptographic Attacks Quiz

Cryptographic Attacks Quiz

11th Grade

8 Qs

quiz-placeholder

Similar activities

Dream SMP

Dream SMP

KG - Professional Development

12 Qs

Cibersegurança

Cibersegurança

11th Grade

7 Qs

Communication & Networking - IP Addressing

Communication & Networking - IP Addressing

2nd - 12th Grade

10 Qs

Detecting and Preventing Cyber Security Threats

Detecting and Preventing Cyber Security Threats

9th - 12th Grade

12 Qs

Physical Security Quiz

Physical Security Quiz

9th Grade - University

10 Qs

CSP Unit 10 Pre-Assessment - Cybersecurity

CSP Unit 10 Pre-Assessment - Cybersecurity

9th - 12th Grade

10 Qs

Identity Theft

Identity Theft

9th - 12th Grade

10 Qs

IT Policies

IT Policies

9th - 11th Grade

13 Qs

Cryptographic Attacks Quiz

Cryptographic Attacks Quiz

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Grit and Motivation

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called when two hashes are the same?

Mathematical Error

Overflow

Race Condition

Collision

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Birthday problem?

Considers the probability that in a set of N randomly chosen people, two people will have the same birthday

Considers the probability that in a set of N randomly chosen people, another person will share your birthday

Considers the probability that in a set of N uniformly chosen people, two people will have the same birthday

Considers the probability that in a set of N randomly chosen people, 50% of the people will have the same birthday

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are passwords typically stored within a database?

Hashed

Encrypted

Encoded

In Binary Format

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many characters long are MD5 hashes?

16

32

64

128

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute force attack?

Physically breaking into a secure repository to steal information

Attempting to randomly guess based on some probability what the right answer would be

Trying all possible combinations and permutations until the right guess works

Use a logarithmic algorithm to reduce the numbers of potential guesses before selecting from the options available

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hashing algorithm was first published in 1992 and had collisions verified in 1996?

MD1

MD3

MD5

MD7

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One way to help strengthen a hashed password to _______.

Use multiple passwords

Salt the password

Save passwords in a file

Encrypt passwords

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ______ attack is when a malicious actor is able to attack a system by using older version of software.

downgrade

prehistoric

pen and paper

precursory

Discover more resources for Computers