Cryptographic Attaches Quiz

Cryptographic Attaches Quiz

1st Grade

8 Qs

quiz-placeholder

Similar activities

Auditing - Introduction

Auditing - Introduction

1st - 4th Grade

8 Qs

LEA 1 QUIZ #2

LEA 1 QUIZ #2

1st Grade

10 Qs

happy birthday dear chinu

happy birthday dear chinu

1st Grade

6 Qs

Group Work Mastery- Bayaan Academy- Sahrish Darjat

Group Work Mastery- Bayaan Academy- Sahrish Darjat

1st - 5th Grade

10 Qs

Probability

Probability

KG - Professional Development

10 Qs

Sathya.P about Quiz

Sathya.P about Quiz

1st - 3rd Grade

10 Qs

Orientation Quiz

Orientation Quiz

1st Grade

10 Qs

The Hindi Quizizz!

The Hindi Quizizz!

KG - University

10 Qs

Cryptographic Attaches Quiz

Cryptographic Attaches Quiz

Assessment

Quiz

Professional Development

1st Grade

Hard

Created by

Grit and Motivation

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is it called when two hashes are the same?

Mathematical Error

Overflow

Race Condition

Collision

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Birthday problem?

Considers the probability that in a set of N randomly chosen people, two people will have the same birthday

Considers the probability that in a set of N randomly chosen people, another person will share your birthday

Considers the probability that in a set of N uniformly chosen people, two people will have the same birthday

Considers the probability that in a set of N randomly chosen people, 50% of the people will have the same birthday

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are passwords typically stored within a database?

Hashed

Encrypted

Encoded

In Binary Format

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many characters long are MD5 hashes?

16

32

64

128

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute force attack?

Physically breaking into a secure repository to steal information

Attempting to randomly guess based on some probability what the right answer would be

Trying all possible combinations and permutations until the right guess works

Use a logarithmic algorithm to reduce the numbers of potential guesses before selecting from the options available

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hashing algorithm was first published in 1992 and had collisions verified in 1996?

MD1

MD3

MD5

7.

OPEN ENDED QUESTION

3 mins • 1 pt

One way to help strengthen a hashed password to _______.

Evaluate responses using AI:

OFF

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ______ attack is when a malicious actor is able to attack a system by using older version of software.

A. downgrade

B. prehistoric

C. pen and paper

D. precursory

Discover more resources for Professional Development