The ABC's of Cryptology Review

Quiz
•
Computers
•
6th - 8th Grade
•
Hard

Fabian Bowman
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Encryption plays a crucial role in maintaining which part(s) of the CIA triad?
Confidentiality
Integrity and Aviailability
Confidentiality and Availability
Confidentiality and Integrity
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Encrypted information is only viewable by authorized users who have the correct key to decrypt.
Confidential
Integrity
Availability
Security
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
To decrypt an encrypted message, pass the encrypted message and the _____ to the decrypt function.
crytology
decrypted message
key
ciphertext
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The attacker knows that the Caesar cipher shifts each letter by a certain number, so they decide to try every possible key (shift) from 1 to 25.
Frequency analysis
Brute Force
Frequency distribution
Using a dictionary
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mason left his password screen open while passing out papers for class. Bryson sees this and changes the password locking Mason out of his Tictok. Bryson tells the class that Mason he encrypted the word "Password." Parker takes the Phone and unlocks it and then locks it again while telling Mason to figure it out on himself. What Method of code-breaking did Parker use?
Rainbow Table
Brute Force
Using a dictionary
Letter Frequency Analysis
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary flaw with the Caesar Cipher and other substitution ciphers?
It could not be applied to all messages
With enough frequency, a message could be decryted
It could only be used in English
There were too many options when encrypting a message
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What makes the Vigenère Cipher resistant to being cracked with brute force and letter frequency analysis?
It uses a single fixed shift for all letters in the plaintext.
It substitutes each letter with a number instead of a letter.
It uses multiple shifts based on the keyword, making brute force and letter frequency analysis ineffective.
It only encrypts vowels, leaving consonants unchanged.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Cryptography Basics

Quiz
•
6th - 8th Grade
10 questions
Encryption 2

Quiz
•
8th - 10th Grade
7 questions
Cipher Encryption

Quiz
•
6th - 8th Grade
9 questions
Encryption and Data Security Quiz

Quiz
•
6th - 8th Grade
10 questions
HW: Week 2 - Cybersecurity - Alan Turing

Quiz
•
6th - 8th Grade
13 questions
1.3.1 - Encryption & Hashing

Quiz
•
8th - 12th Grade
15 questions
UJI KOMPETENSI BAB 5 JARINGAN KOMPUTER

Quiz
•
7th - 9th Grade
11 questions
Y7 Code Breaking

Quiz
•
7th Grade
Popular Resources on Wayground
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
10 questions
"LAST STOP ON MARKET STREET" Vocabulary Quiz

Quiz
•
3rd Grade
19 questions
Fractions to Decimals and Decimals to Fractions

Quiz
•
6th Grade
16 questions
Logic and Venn Diagrams

Quiz
•
12th Grade
15 questions
Compare and Order Decimals

Quiz
•
4th - 5th Grade
20 questions
Simplifying Fractions

Quiz
•
6th Grade
20 questions
Multiplication facts 1-12

Quiz
•
2nd - 3rd Grade