IAS QUIZ 11

IAS QUIZ 11

University

25 Qs

quiz-placeholder

Similar activities

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

Compiler Design

Compiler Design

University

20 Qs

IAS CH7 QUIZ

IAS CH7 QUIZ

University

30 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

Hashing

Hashing

University

20 Qs

NETWORK SECURITY

NETWORK SECURITY

University

25 Qs

Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

9th Grade - University

20 Qs

Cryptography

Cryptography

University

23 Qs

IAS QUIZ 11

IAS QUIZ 11

Assessment

Quiz

Computers

University

Easy

Created by

Darwin Vargas

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virtually all cryptographic hash functions involve the iterative use of a compression function.

T

F

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.

F

T

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hash functions can be used for intrusion and virus detections.

T

F

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The cryptographic hash function is not a versatile cryptographic algorithm.

F

T

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

it is possible to use a hash function but no encryption for message authentication.

T

F

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hash functions are commonly used to create a one-way password file.

T

F

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.

T

F

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?