
Net Quiz 5
Authored by Geok Soon Sia
Computers
11th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Identify three situations in which the hashing function can be applied. (Choose three.)
DES
PKI
IPsec
WPA
CHAP
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?
Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.
Turn off antivirus on all the computers.
Distribute the program on a thumb drive.
Encrypt the program and require a password after it is downloaded.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
An email sent throughout the company stated that there would be a change in security policy. The security officer who was presumed to have sent the message stated the message was not sent and the company may be a victim of a spoofed email. What could have been added to the message to ensure the message actually came from the person?
non-repudiation
digital signature
asymmetric key
hashing
4.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What are three NIST-approved digital signature algorithms? (Choose three.)
DSA
ECDSA
SHA256
MD5
RSA
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Alice and Bob use the same password to login into the company network. This means both would have the exact same hash for their passwords. How to prevent both password hashes from being the same?
peppering
pseudo-random generator
salting
RSA
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is the step by step process for creating a digital signature?
Create a message digest; encrypt the digest with the private key of the sender; and bundle the message, encrypted digest, and public key together in order to sign the document.
Create a message digest; encrypt the digest with the public key of the sender; and bundle the message, encrypted digest, and public key together to sign the document.
Create a message; encrypt the message with a MD5 hash; and send the bundle with a public key.
Create a SHA-1 hash; encrypt the hash with the private key of the sender; and bundle the message, encrypted hash, and public key together to signed document.
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is a strength of using a hashing function?
It is a one-way function and not reversible.
Two different files can be created that have the same output.
It has a variable length output.
It is not commonly used in security.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Software Design and Development Quick Quiz 3
Quiz
•
11th - 12th Grade
11 questions
Cyber Security Solutions
Quiz
•
9th - 12th Grade
10 questions
Bitmap v Vector Images
Quiz
•
KG - University
10 questions
R082 Book Cover Assets planning
Quiz
•
7th - 12th Grade
10 questions
DTJSQuiz
Quiz
•
11th Grade
10 questions
Latency and Bandwidth
Quiz
•
10th - 11th Grade
15 questions
Internet Safety Quiz
Quiz
•
9th - 12th Grade
10 questions
Scratch (28th March)
Quiz
•
KG - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade