Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

9th Grade - University

20 Qs

quiz-placeholder

Similar activities

PythonProgramming

PythonProgramming

University

15 Qs

DBMS - Fundamentals

DBMS - Fundamentals

University

19 Qs

Q7/Q8 Email Vocabulary (Basics in 21t4s)

Q7/Q8 Email Vocabulary (Basics in 21t4s)

5th - 9th Grade

17 Qs

LA1.C1: Introduction to Small Basic

LA1.C1: Introduction to Small Basic

9th Grade

15 Qs

Text me!

Text me!

University

20 Qs

Summative Test in EMPTECH 3rd

Summative Test in EMPTECH 3rd

12th Grade

20 Qs

Basic Excel

Basic Excel

University

15 Qs

TO PAS AIJ

TO PAS AIJ

11th Grade

20 Qs

Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

Assessment

Quiz

Life Skills, Computers

9th Grade - University

Medium

Created by

Paul Zettler

Used 51+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This strategy for cracking a has attempts every possible code until a match is found.

brute force

dictionary

rainbow table

lookup table

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This type of attack against a hash attempts the common words, phrases, and passwords in a language.

brute force

dictionary

rainbow table

lookup table

3.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Select the two basic hash algorithms listed below. (Pick2)

Message Digest 5

Secure Hash Algorithm - 1

HMAC

WPA

4.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Select the situations listed below when hashing should be used. (Select all that apply!)

When you need to ensure file integrity.

PKI Certificates

IPsec Protocols

Routing Authentication

Challenge Response Protocols (CHAP)

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Which of the following does NOT accurately describe hashing.

One way math function

Fixed Output Length

Fixed Input Length

Two different inputs almost never give the same output

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is how HMAC is different from other basic hash algorithms.

One way math function

Fixed Output Length

Requires a secret key along with the message digest

Variable Input Length

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is the purpose of CSPRNG

Perform hash calculations

Encrypt data

Generate Salts

Concatenate Strings in Programming

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?