
Week 10 - Cyber Attacks Exercise 2
Computers
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a brute-force attack in cryptography?
An attack that uses mathematical formulas to decrypt data.
An attack that involves trying all possible keys to decrypt the data.
An attack that involves manipulating the key during encryption.
An attack that exploits weak encryption algorithms.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of attack that tries to discover the encryption key by analyzing patterns in ciphertext?
Birthday attack
Dictionary attack
Ciphertext-only attack
Man-in-the-middle attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involves intercepting and altering the communication between two parties without their knowledge?
Brute-force attack
Replay attack
Man-in-the-middle attack
Side-channel attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cryptographic attack that exploits weaknesses in a hash function to produce two different messages with the same hash value is called what?
Collision attack
Birthday attack
Chosen-plaintext attack
Differential attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which type of cryptographic attack does the attacker have access to both the plaintext and its corresponding ciphertext?
Known-plaintext attack
Chosen-ciphertext attack
Chosen-plaintext attack
Ciphertext-only attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack involves flooding a target with excessive traffic, causing a denial of service?
SQL Injection
Denial of Service (DoS)
Cross-Site Scripting (XSS)
Buffer Overflow
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack targets a vulnerability in web applications that allows attackers to execute malicious SQL statements?
Cross-Site Request Forgery (CSRF)
Cross-Site Scripting (XSS)
Directory Traversal
SQL Injection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
14 questions
cyber security
Quiz
•
KG - Professional Dev...
13 questions
Unit 10 - Internet Security
Quiz
•
12th Grade - University
11 questions
Cross-Site Request Forgery
Quiz
•
University
10 questions
Post Assessment - Cybersecurity Awareness
Quiz
•
9th Grade - Professio...
10 questions
Organisational security governance
Quiz
•
University
12 questions
ISRC CyberTrivia
Quiz
•
University
11 questions
SMITE 6.0: Get to Know Cybersecurity
Quiz
•
University
10 questions
International Law in Cyberspace
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
20 questions
Endocrine System
Quiz
•
University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
30 questions
W25: PSYCH 250 - Exam 2 Practice
Quiz
•
University
5 questions
Inherited and Acquired Traits of Animals
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University
38 questions
Unit 8 Review - Absolutism & Revolution
Quiz
•
10th Grade - University