Hashing, Digital Signatures and BlockChain Practice Questions

Hashing, Digital Signatures and BlockChain Practice Questions

Assessment

Flashcard

Computers

11th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

10 questions

Show all answers

1.

FLASHCARD QUESTION

Front

A cybersecurity analyst needs to verify that a file has not been altered during transmission. Which cryptographic method should they use? Options: Symmetric encryption, Hashing, Digital certificates, Transport encryption

Back

Hashing

2.

FLASHCARD QUESTION

Front

Which of the following best describes the characteristics of a cryptographic hash? It is reversible using a private key., It provides confidentiality by encrypting data., It creates a unique, fixed-length value for input data., It replaces sensitive information with tokens.

Back

It creates a unique, fixed-length value for input data.

3.

FLASHCARD QUESTION

Front

An organization is implementing digital signatures for secure email communication. Which of the following goals does this technology primarily address? Confidentiality, Authentication and integrity, Obfuscation, Availability

Back

Authentication and integrity

4.

FLASHCARD QUESTION

Front

A system administrator notices that two different files produce the same hash value. What type of vulnerability does this scenario illustrate?

Back

Hash collision

5.

FLASHCARD QUESTION

Front

Which of the following best describes how adding a salt to a password before hashing improves security? Options: It makes the password hashing process faster. It prevents the reuse of the same password across multiple accounts. It ensures that identical passwords generate different hash values. It allows the password to be decrypted more securely.

Back

It ensures that identical passwords generate different hash values.

6.

FLASHCARD QUESTION

Front

A cybersecurity engineer is concerned about the possibility of MD5 hash collisions being exploited. What is the primary risk associated with hash collisions?

Back

Different inputs can appear identical, undermining data integrity.

7.

FLASHCARD QUESTION

Front

Which of the following is a key feature of blockchain technology that ensures its resistance to tampering? Private key encryption, Use of digital certificates, Hashing each block and linking it to the previous block, Storing data on centralized servers

Back

Hashing each block and linking it to the previous block

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?