Classical Cryptography Challenge

Classical Cryptography Challenge

University

25 Qs

quiz-placeholder

Similar activities

Soal Ulangan Internet 8.7

Soal Ulangan Internet 8.7

8th Grade - University

20 Qs

E5-1 Data Processing  CE2

E5-1 Data Processing CE2

9th Grade - University

21 Qs

ARDU TEST

ARDU TEST

9th Grade - University

20 Qs

Cyber Offences Quiz

Cyber Offences Quiz

University

20 Qs

LONG QUIZ MIS

LONG QUIZ MIS

University

20 Qs

Database quiz part 1 - D2T4

Database quiz part 1 - D2T4

University

20 Qs

Algorithm Characteristics and Applications Quiz

Algorithm Characteristics and Applications Quiz

12th Grade - University

20 Qs

KUIZ DIAGNOSTIK

KUIZ DIAGNOSTIK

11th Grade - University

20 Qs

Classical Cryptography Challenge

Classical Cryptography Challenge

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Usman Ali

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the key shift in a Caesar cipher if the key is 3?

3 positions diagonal in the alphabet

1 position forward in the alphabet

3 positions forward in the alphabet

3 positions backward in the alphabet

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cipher uses a keyword to determine the letter substitution?

Caesar cipher

Vigenère cipher

Transposition cipher

Substitution cipher

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a Vigenère cipher, what is the length of the repeating key if the key is 'KEY'?

5

4

3

2

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main characteristic of a Vernam cipher?

It encrypts data using a fixed key.

It uses a one-time pad for encryption.

It uses a symmetric key for encryption.

It relies on a public key infrastructure.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cipher is considered unbreakable when used correctly?

Caesar cipher

RSA encryption

Vigenère cipher

one-time pad

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In a Playfair cipher, how are duplicate letters handled?

Duplicate letters in a digraph are handled by replacing the second letter with a filler letter, usually 'X'.

Duplicate letters are combined into a single letter.

Duplicate letters are ignored entirely.

Duplicate letters are replaced with the next letter in the alphabet.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary method of encryption in a Rail Fence cipher?

Zigzag pattern across multiple rails

Substitution of letters

Straight line encryption

Transposition of words

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?