
OWASP Top 10
Authored by Olena Izmailova
Computers
Professional Development
Used 83+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does `nonrepudiation` mean?
Has the data changed?
What can you do?
Who did what?
Who created this data?
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the cryptographic hash function properties?
Reversible function change
Deterministic behavior
Unfixed hash values
One-way function change
Fixed-length hash values
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What hash functions are safe from the `hashlib` package?
SHA-1
BLAKE2
MD5
SHA-2
SHA-3
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who is the winner of the 2015 Password Hashing Competition?
Argon2
BLAKE2
scrypt
SHA-3
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which hash function you should use if you need to hash large amounts of data?
SHA-2
Argon2
bcrypt
BLAKE2
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which package you shouldn’t use for a key generation?
os
random
secrets
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is safe to use `==` to compare 2 hash values.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?