
Net Quiz 5

Quiz
•
Computers
•
11th Grade
•
Medium
Geok Soon Sia
Used 5+ times
FREE Resource
19 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Identify three situations in which the hashing function can be applied. (Choose three.)
DES
PKI
IPsec
WPA
CHAP
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?
Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.
Turn off antivirus on all the computers.
Distribute the program on a thumb drive.
Encrypt the program and require a password after it is downloaded.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
An email sent throughout the company stated that there would be a change in security policy. The security officer who was presumed to have sent the message stated the message was not sent and the company may be a victim of a spoofed email. What could have been added to the message to ensure the message actually came from the person?
non-repudiation
digital signature
asymmetric key
hashing
4.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What are three NIST-approved digital signature algorithms? (Choose three.)
DSA
ECDSA
SHA256
MD5
RSA
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Alice and Bob use the same password to login into the company network. This means both would have the exact same hash for their passwords. How to prevent both password hashes from being the same?
peppering
pseudo-random generator
salting
RSA
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is the step by step process for creating a digital signature?
Create a message digest; encrypt the digest with the private key of the sender; and bundle the message, encrypted digest, and public key together in order to sign the document.
Create a message digest; encrypt the digest with the public key of the sender; and bundle the message, encrypted digest, and public key together to sign the document.
Create a message; encrypt the message with a MD5 hash; and send the bundle with a public key.
Create a SHA-1 hash; encrypt the hash with the private key of the sender; and bundle the message, encrypted hash, and public key together to signed document.
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is a strength of using a hashing function?
It is a one-way function and not reversible.
Two different files can be created that have the same output.
It has a variable length output.
It is not commonly used in security.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Authentication Quiz

Quiz
•
11th Grade - University
10 questions
CyberSecurity Basics

Quiz
•
6th - 12th Grade
10 questions
Cybersecurity Fundamentals Week 4 Quiz

Quiz
•
KG - University
12 questions
Exit Ticket - Linked Lists and HashTables

Quiz
•
11th Grade
12 questions
Cybersecurity Chapter 5

Quiz
•
11th Grade
14 questions
Java HashMap Quiz

Quiz
•
11th Grade
16 questions
Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Quiz
•
9th - 12th Grade
12 questions
AP CSP Unit 8 Review

Quiz
•
11th Grade
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade