Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

9th Grade - University

20 Qs

quiz-placeholder

Similar activities

Cryptographic Hashes and Digital Signatures Quiz

Cryptographic Hashes and Digital Signatures Quiz

12th Grade

15 Qs

Cryptography

Cryptography

University

23 Qs

Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

9th - 12th Grade

16 Qs

004_Non-repudiation - CompTIA Security+ SY0-701 - 1.2

004_Non-repudiation - CompTIA Security+ SY0-701 - 1.2

12th Grade - University

19 Qs

Module 6

Module 6

12th Grade

21 Qs

Revision for Chapter 5

Revision for Chapter 5

University

16 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

Quiz-ECC-SHA

Quiz-ECC-SHA

University

18 Qs

Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

Assessment

Quiz

Life Skills, Computers

9th Grade - University

Medium

Created by

Paul Zettler

Used 51+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This strategy for cracking a has attempts every possible code until a match is found.

brute force

dictionary

rainbow table

lookup table

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This type of attack against a hash attempts the common words, phrases, and passwords in a language.

brute force

dictionary

rainbow table

lookup table

3.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Select the two basic hash algorithms listed below. (Pick2)

Message Digest 5

Secure Hash Algorithm - 1

HMAC

WPA

4.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Select the situations listed below when hashing should be used. (Select all that apply!)

When you need to ensure file integrity.

PKI Certificates

IPsec Protocols

Routing Authentication

Challenge Response Protocols (CHAP)

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Which of the following does NOT accurately describe hashing.

One way math function

Fixed Output Length

Fixed Input Length

Two different inputs almost never give the same output

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is how HMAC is different from other basic hash algorithms.

One way math function

Fixed Output Length

Requires a secret key along with the message digest

Variable Input Length

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is the purpose of CSPRNG

Perform hash calculations

Encrypt data

Generate Salts

Concatenate Strings in Programming

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?