Search Header Logo

Week 10 - Cyber Attacks Exercise 2

Computers

University

Used 4+ times

Week 10 - Cyber Attacks Exercise 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a brute-force attack in cryptography?

An attack that uses mathematical formulas to decrypt data.

An attack that involves trying all possible keys to decrypt the data.

An attack that involves manipulating the key during encryption.

An attack that exploits weak encryption algorithms.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of attack that tries to discover the encryption key by analyzing patterns in ciphertext?

  • Birthday attack

Dictionary attack

  • Ciphertext-only attack

Man-in-the-middle attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves intercepting and altering the communication between two parties without their knowledge?

Brute-force attack

Replay attack

Man-in-the-middle attack

Side-channel attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cryptographic attack that exploits weaknesses in a hash function to produce two different messages with the same hash value is called what?

Collision attack

Birthday attack

Chosen-plaintext attack

Differential attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of cryptographic attack does the attacker have access to both the plaintext and its corresponding ciphertext?

Known-plaintext attack

Chosen-ciphertext attack

Chosen-plaintext attack

Ciphertext-only attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves flooding a target with excessive traffic, causing a denial of service?

SQL Injection

Denial of Service (DoS)

Cross-Site Scripting (XSS)

Buffer Overflow

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack targets a vulnerability in web applications that allows attackers to execute malicious SQL statements?

Cross-Site Request Forgery (CSRF)

Cross-Site Scripting (XSS)

Directory Traversal

SQL Injection

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?