INS2

INS2

University

18 Qs

quiz-placeholder

Similar activities

CORLANG Week6-7

CORLANG Week6-7

10th Grade - University

20 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Memory-Mobo-Hard/Software

Memory-Mobo-Hard/Software

University

18 Qs

OOP 1 Undiksha

OOP 1 Undiksha

12th Grade - University

13 Qs

Closing entries

Closing entries

University

20 Qs

PARC Linux Basic Part 2

PARC Linux Basic Part 2

University

20 Qs

SQL Quiz

SQL Quiz

University

18 Qs

BIM1014 Quiz 2

BIM1014 Quiz 2

KG - University

15 Qs

INS2

INS2

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Ms. R

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Birthday Attack?

An attack exploiting the properties of birthday parties

A brute-force attack to find two inputs with the same hash

An attack on RSA encryption

A denial-of-service (DoS) attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Birthday Attack exploits which cryptographic weakness?

Weak encryption keys

Hash collisions

Slow processing speed

Public key exposure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is the Birthday Attack considered efficient compared to a full brute-force attack?

It finds hash collisions faster due to probability theory

It only requires knowledge of the private key

It does not require computational resources

It works only on small hash functions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the probability that two people in a room of 23 people share the same birthday?

Around 10%

Around 25%

Around 50%

Around 90%

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Birthday Attack is particularly useful in attacking which type of digital security mechanism?

Symmetric encryption

Digital signatures

Firewalls

VPNs

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a real-world example of a Birthday Attack?

Cracking a password using brute force

Finding two documents with different content but the same hash

Sending fake emails with forged sender addresses

Hacking into a database using SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who developed the Tiger hash function?

Ronald Rivest

Ross Anderson and Eli Biham

Whitfield Diffie and Martin Hellman

Bruce Schneier

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?