Net Quiz 5

Net Quiz 5

11th Grade

19 Qs

quiz-placeholder

Similar activities

File Management Part 2

File Management Part 2

9th - 12th Grade

10 Qs

GCSE Computing 1.5.1 Operating Systems #1

GCSE Computing 1.5.1 Operating Systems #1

9th - 11th Grade

10 Qs

Python - Chpt 1 - Review

Python - Chpt 1 - Review

9th - 12th Grade

15 Qs

Exploring Python: Input and Output Essentials

Exploring Python: Input and Output Essentials

9th Grade - University

10 Qs

APCSP Review 2

APCSP Review 2

9th - 12th Grade

14 Qs

BTEC DIT C3 LAA - Using cloud and traditional systems

BTEC DIT C3 LAA - Using cloud and traditional systems

10th - 11th Grade

10 Qs

Encryption and Caesar Cipher Quiz

Encryption and Caesar Cipher Quiz

9th - 12th Grade

15 Qs

Empowerment Technology

Empowerment Technology

11th Grade

10 Qs

Net Quiz 5

Net Quiz 5

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Geok Soon Sia

Used 5+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Identify three situations in which the hashing function can be applied. (Choose three.)

DES

PKI

IPsec

WPA

CHAP

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?

Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.

Turn off antivirus on all the computers.

Distribute the program on a thumb drive.

Encrypt the program and require a password after it is downloaded.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An email sent throughout the company stated that there would be a change in security policy. The security officer who was presumed to have sent the message stated the message was not sent and the company may be a victim of a spoofed email. What could have been added to the message to ensure the message actually came from the person?

non-repudiation

digital signature

asymmetric key

hashing

4.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What are three NIST-approved digital signature algorithms? (Choose three.)

DSA

ECDSA

SHA256

MD5

RSA

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alice and Bob use the same password to login into the company network. This means both would have the exact same hash for their passwords. How to prevent both password hashes from being the same?

peppering

pseudo-random generator

salting

RSA

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the step by step process for creating a digital signature?

Create a message digest; encrypt the digest with the private key of the sender; and bundle the message, encrypted digest, and public key together in order to sign the document.

Create a message digest; encrypt the digest with the public key of the sender; and bundle the message, encrypted digest, and public key together to sign the document.

Create a message; encrypt the message with a MD5 hash; and send the bundle with a public key.

Create a SHA-1 hash; encrypt the hash with the private key of the sender; and bundle the message, encrypted hash, and public key together to signed document.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a strength of using a hashing function?

It is a one-way function and not reversible.

Two different files can be created that have the same output.

It has a variable length output.

It is not commonly used in security.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?