Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

9th Grade - University

20 Qs

quiz-placeholder

Similar activities

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

CN_Minor2

CN_Minor2

University

20 Qs

Lenguaje de Definición de Datos

Lenguaje de Definición de Datos

University

18 Qs

CSS Acronyms

CSS Acronyms

9th - 10th Grade

20 Qs

REMEDIAL PAS DDG GANJIL

REMEDIAL PAS DDG GANJIL

University

20 Qs

BTEC Theory quiz 1: Networks and Internet

BTEC Theory quiz 1: Networks and Internet

8th - 11th Grade

16 Qs

DBC CHAPTER 3 - REVISION

DBC CHAPTER 3 - REVISION

University

15 Qs

Computer Science - X

Computer Science - X

8th - 10th Grade

20 Qs

Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

Assessment

Quiz

Life Skills, Computers

9th Grade - University

Practice Problem

Medium

Created by

Paul Zettler

Used 52+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This strategy for cracking a has attempts every possible code until a match is found.

brute force

dictionary

rainbow table

lookup table

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This type of attack against a hash attempts the common words, phrases, and passwords in a language.

brute force

dictionary

rainbow table

lookup table

3.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Select the two basic hash algorithms listed below. (Pick2)

Message Digest 5

Secure Hash Algorithm - 1

HMAC

WPA

4.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Select the situations listed below when hashing should be used. (Select all that apply!)

When you need to ensure file integrity.

PKI Certificates

IPsec Protocols

Routing Authentication

Challenge Response Protocols (CHAP)

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Which of the following does NOT accurately describe hashing.

One way math function

Fixed Output Length

Fixed Input Length

Two different inputs almost never give the same output

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is how HMAC is different from other basic hash algorithms.

One way math function

Fixed Output Length

Requires a secret key along with the message digest

Variable Input Length

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is the purpose of CSPRNG

Perform hash calculations

Encrypt data

Generate Salts

Concatenate Strings in Programming

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?