Garden State Cyber - Unit 4.2 - Quiz

Garden State Cyber - Unit 4.2 - Quiz

11 Qs

quiz-placeholder

Similar activities

Quiz - Garden State Cyber Unit 2 - Human Factors

Quiz - Garden State Cyber Unit 2 - Human Factors

KG - University

14 Qs

NEP 2020 and LMS Implementation Quiz

NEP 2020 and LMS Implementation Quiz

University

15 Qs

TRAIL SPM SAINS KOMPUTER SET 2

TRAIL SPM SAINS KOMPUTER SET 2

KG - University

16 Qs

Test

Test

University

16 Qs

L4 Implications of Cloud Technologies

L4 Implications of Cloud Technologies

KG - University

7 Qs

Unit2 Past Paper 2020

Unit2 Past Paper 2020

KG - University

15 Qs

Google Docs: Sharing and Collaborating Quiz

Google Docs: Sharing and Collaborating Quiz

8th Grade

10 Qs

AQA A-Level Computer Science: Queues and Data Structures Quiz

AQA A-Level Computer Science: Queues and Data Structures Quiz

KG - University

15 Qs

Garden State Cyber - Unit 4.2 - Quiz

Garden State Cyber - Unit 4.2 - Quiz

Assessment

Quiz

others

Medium

Created by

Anthony DellaRosa

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Scrambling data so that it is unreadable to anyone except those who know the trick to decoding it is...
Cybersecurity
Coding
Cryptography
Hieroglyphics

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The data that has been encrypted is called...
Algorithm
Ciphertext
Plaintext
Code

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

This is a method of encryption in when the order of the letters is changed. Scytale cipher, in which a ribbon is wrapped around a cylinder is an example.
Transposition
Substitution
Hieroglyphics
Graphics

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A historic cipher in which the alphabet is shifted left or right a given number of spaces.
Julius Cipher
Caesar Cipher
Vigenere Cipher
Enigma Cipher

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A substitution cipher based on multiple alphabets and a system to switch between the them using a password. A table or chart is often used.
Julius Cipher
Caesar Cipher
Vigenere Cipher
Enigma Cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

This is a technique used to solve substitution ciphers based on commonly used letters and words.
frequency analysis
guess and check
polyalphabetic analysis
encryption analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Using the simplest Caesar cipher, decode the following ciphertext. DZCFS
STOCK
BRAIN
CYBER
TESLA

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?