The ABC's of Cryptology Review

The ABC's of Cryptology Review

6th - 8th Grade

10 Qs

quiz-placeholder

Similar activities

Javascript mine

Javascript mine

7th Grade

15 Qs

G8 W 1 IGCSE 0417 Types of computer

G8 W 1 IGCSE 0417 Types of computer

8th Grade

15 Qs

File Explorer and Sorting Files

File Explorer and Sorting Files

8th Grade

15 Qs

Cyber Security Quiz

Cyber Security Quiz

7th Grade

15 Qs

KS3 Data Representation R1 Bits Nibbles Bytes

KS3 Data Representation R1 Bits Nibbles Bytes

8th Grade

9 Qs

Introduction to the word - Formative

Introduction to the word - Formative

4th - 6th Grade

14 Qs

Introduction of Arduino

Introduction of Arduino

6th - 8th Grade

12 Qs

Coding Quiz

Coding Quiz

6th - 10th Grade

15 Qs

The ABC's of Cryptology Review

The ABC's of Cryptology Review

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

Fabian Bowman

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption plays a crucial role in maintaining which part(s) of the CIA triad?

Confidentiality

Integrity and Aviailability

Confidentiality and Availability

Confidentiality and Integrity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encrypted information is only viewable by authorized users who have the correct key to decrypt.

Confidential

Integrity

Availability

Security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To decrypt an encrypted message, pass the encrypted message and the _____ to the decrypt function.

crytology

decrypted message

key

ciphertext

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The attacker knows that the Caesar cipher shifts each letter by a certain number, so they decide to try every possible key (shift) from 1 to 25.

Frequency analysis

Brute Force

Frequency distribution

Using a dictionary

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mason left his password screen open while passing out papers for class. Bryson sees this and changes the password locking Mason out of his Tictok. Bryson tells the class that Mason he encrypted the word "Password." Parker takes the Phone and unlocks it and then locks it again while telling Mason to figure it out on himself. What Method of code-breaking did Parker use?

Rainbow Table

Brute Force

Using a dictionary

Letter Frequency Analysis

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary flaw with the Caesar Cipher and other substitution ciphers?

It could not be applied to all messages

With enough frequency, a message could be decryted

It could only be used in English

There were too many options when encrypting a message

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes the Vigenère Cipher resistant to being cracked with brute force and letter frequency analysis?

It uses a single fixed shift for all letters in the plaintext.

It substitutes each letter with a number instead of a letter.

It uses multiple shifts based on the keyword, making brute force and letter frequency analysis ineffective.

It only encrypts vowels, leaving consonants unchanged.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?