INS2

INS2

University

18 Qs

quiz-placeholder

Similar activities

Hash

Hash

University

20 Qs

HASHING IN DBMS

HASHING IN DBMS

University

15 Qs

05 - Hashing #1

05 - Hashing #1

University

15 Qs

Quiz on Malware and Cybersecurity

Quiz on Malware and Cybersecurity

12th Grade - University

18 Qs

CryptoQuiz

CryptoQuiz

University

15 Qs

202309 BMIT27x3 Revision Quiz 2

202309 BMIT27x3 Revision Quiz 2

University

20 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

20 Qs

Rail Fence Cipher

Rail Fence Cipher

12th Grade - University

15 Qs

INS2

INS2

Assessment

Quiz

Computers

University

Medium

Created by

Ms. R

Used 1+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Birthday Attack?

An attack exploiting the properties of birthday parties

A brute-force attack to find two inputs with the same hash

An attack on RSA encryption

A denial-of-service (DoS) attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Birthday Attack exploits which cryptographic weakness?

Weak encryption keys

Hash collisions

Slow processing speed

Public key exposure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is the Birthday Attack considered efficient compared to a full brute-force attack?

It finds hash collisions faster due to probability theory

It only requires knowledge of the private key

It does not require computational resources

It works only on small hash functions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the probability that two people in a room of 23 people share the same birthday?

Around 10%

Around 25%

Around 50%

Around 90%

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Birthday Attack is particularly useful in attacking which type of digital security mechanism?

Symmetric encryption

Digital signatures

Firewalls

VPNs

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a real-world example of a Birthday Attack?

Cracking a password using brute force

Finding two documents with different content but the same hash

Sending fake emails with forged sender addresses

Hacking into a database using SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who developed the Tiger hash function?

Ronald Rivest

Ross Anderson and Eli Biham

Whitfield Diffie and Martin Hellman

Bruce Schneier

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?