
Net Quiz 5

Quiz
•
Computers
•
11th Grade
•
Medium
Geok Soon Sia
Used 5+ times
FREE Resource
19 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Identify three situations in which the hashing function can be applied. (Choose three.)
DES
PKI
IPsec
WPA
CHAP
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?
Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.
Turn off antivirus on all the computers.
Distribute the program on a thumb drive.
Encrypt the program and require a password after it is downloaded.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
An email sent throughout the company stated that there would be a change in security policy. The security officer who was presumed to have sent the message stated the message was not sent and the company may be a victim of a spoofed email. What could have been added to the message to ensure the message actually came from the person?
non-repudiation
digital signature
asymmetric key
hashing
4.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What are three NIST-approved digital signature algorithms? (Choose three.)
DSA
ECDSA
SHA256
MD5
RSA
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Alice and Bob use the same password to login into the company network. This means both would have the exact same hash for their passwords. How to prevent both password hashes from being the same?
peppering
pseudo-random generator
salting
RSA
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is the step by step process for creating a digital signature?
Create a message digest; encrypt the digest with the private key of the sender; and bundle the message, encrypted digest, and public key together in order to sign the document.
Create a message digest; encrypt the digest with the public key of the sender; and bundle the message, encrypted digest, and public key together to sign the document.
Create a message; encrypt the message with a MD5 hash; and send the bundle with a public key.
Create a SHA-1 hash; encrypt the hash with the private key of the sender; and bundle the message, encrypted hash, and public key together to signed document.
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is a strength of using a hashing function?
It is a one-way function and not reversible.
Two different files can be created that have the same output.
It has a variable length output.
It is not commonly used in security.
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Excel Data Validation Quiz

Quiz
•
9th - 12th Grade
10 questions
BTEC DIT C3 LAA - Technology for Teams

Quiz
•
10th - 11th Grade
15 questions
User Interface Aplikasi

Quiz
•
11th - 12th Grade
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
12 questions
CIW/IBA REVIEW PART-C

Quiz
•
9th - 12th Grade
10 questions
Design Principles

Quiz
•
9th - 11th Grade
10 questions
Pseudocode - OCR ERL

Quiz
•
9th - 12th Grade
16 questions
Basis Data Komputer

Quiz
•
11th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade