
Cybersecurity Essentials Chapter 5 Review
Authored by Paul Zettler
Life Skills, Computers
9th Grade - University
Used 53+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
This strategy for cracking a has attempts every possible code until a match is found.
brute force
dictionary
rainbow table
lookup table
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
This type of attack against a hash attempts the common words, phrases, and passwords in a language.
brute force
dictionary
rainbow table
lookup table
3.
MULTIPLE SELECT QUESTION
5 mins • 1 pt
Select the two basic hash algorithms listed below. (Pick2)
Message Digest 5
Secure Hash Algorithm - 1
HMAC
WPA
4.
MULTIPLE SELECT QUESTION
5 mins • 1 pt
Select the situations listed below when hashing should be used. (Select all that apply!)
When you need to ensure file integrity.
PKI Certificates
IPsec Protocols
Routing Authentication
Challenge Response Protocols (CHAP)
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
Which of the following does NOT accurately describe hashing.
One way math function
Fixed Output Length
Fixed Input Length
Two different inputs almost never give the same output
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
This is how HMAC is different from other basic hash algorithms.
One way math function
Fixed Output Length
Requires a secret key along with the message digest
Variable Input Length
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
This is the purpose of CSPRNG
Perform hash calculations
Encrypt data
Generate Salts
Concatenate Strings in Programming
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?