Revision for Chapter 5

Revision for Chapter 5

University

16 Qs

quiz-placeholder

Similar activities

Cryptography

Cryptography

6th Grade - University

15 Qs

Cyberecurity Ess 2

Cyberecurity Ess 2

University

12 Qs

QuizChapter2

QuizChapter2

University

11 Qs

Hashing

Hashing

University

20 Qs

Blockchain Basics: Algorithm and Techniques

Blockchain Basics: Algorithm and Techniques

University - Professional Development

12 Qs

IT Essentials Ch 13 Review - Security

IT Essentials Ch 13 Review - Security

9th Grade - University

18 Qs

Authentication Quiz

Authentication Quiz

11th Grade - University

15 Qs

Hashing Search - Data Structures

Hashing Search - Data Structures

University

15 Qs

Revision for Chapter 5

Revision for Chapter 5

Assessment

Quiz

Computers

University

Medium

Created by

Kevin Wong

Used 1+ times

FREE Resource

16 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Types of Data Integrity Controls - Hashing Algorithms

Hashing is a tool that ensures ____ _________ by taking binary data (the message)

and producing a fixed-length representation called the hash value or message digest.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Hashing is a one-way mathematical function that is relatively

____ __ _______, but significantly harder to reverse.

Grinding coffee beans is a good analogy of a one-way function.

It is easy to grind coffee beans, but it is almost impossible to put all of the

tiny pieces back together to rebuild the original beans.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A cryptographic hash function has the following properties:

1st property: The input can be any length.

2nd property: The output has a fixed length.

3rd property: The hash function is one way and is not reversible.

4th property: Two different input values will always result in _________ hash values.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A cryptographic hash function has the following properties:

1st property: The input can be any length.

2nd property: The output has a _____ length.

3rd property: The hash function is one way and is not reversible.

4th property: Two different input values will always result in different hash values.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

There are many modern hashing algorithms widely used today. Two of the most popular are MD5 and SHA.

_______ ______ _ (MD5) Algorithm - is a hash algorithm developed by Ron Rivest that produces a 128-bit hash value.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

There are many modern hashing algorithms widely used today. Two of the most popular are MD5 and SHA.
_____ ____ _________ (SHA) – was developed by the U.S. National Institute of Standards and Technology (NIST) and can be implemented in different strengths:

SHA-224 (224 bit)

SHA-256 (256 bit)

SHA-384 (384 bit)

SHA-512 (512 bit)

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Salting is a type of data integrity control use to make hashing more secure.

Describe the situation in which salting is used.


Answer: When the two users have the ____ password.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?