Revision for Chapter 5

Quiz
•
Computers
•
University
•
Medium
Kevin Wong
Used 1+ times
FREE Resource
16 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Types of Data Integrity Controls - Hashing Algorithms
Hashing is a tool that ensures ____ _________ by taking binary data (the message)
and producing a fixed-length representation called the hash value or message digest.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Hashing is a one-way mathematical function that is relatively
____ __ _______, but significantly harder to reverse.
Grinding coffee beans is a good analogy of a one-way function.
It is easy to grind coffee beans, but it is almost impossible to put all of the
tiny pieces back together to rebuild the original beans.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A cryptographic hash function has the following properties:
1st property: The input can be any length.
2nd property: The output has a fixed length.
3rd property: The hash function is one way and is not reversible.
4th property: Two different input values will always result in _________ hash values.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A cryptographic hash function has the following properties:
1st property: The input can be any length.
2nd property: The output has a _____ length.
3rd property: The hash function is one way and is not reversible.
4th property: Two different input values will always result in different hash values.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
There are many modern hashing algorithms widely used today. Two of the most popular are MD5 and SHA.
_______ ______ _ (MD5) Algorithm - is a hash algorithm developed by Ron Rivest that produces a 128-bit hash value.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
There are many modern hashing algorithms widely used today. Two of the most popular are MD5 and SHA.
_____ ____ _________ (SHA) – was developed by the U.S. National Institute of Standards and Technology (NIST) and can be implemented in different strengths:
SHA-224 (224 bit)
SHA-256 (256 bit)
SHA-384 (384 bit)
SHA-512 (512 bit)
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Salting is a type of data integrity control use to make hashing more secure.
Describe the situation in which salting is used.
Answer: When the two users have the ____ password.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
HASHING IN DBMS

Quiz
•
University
20 questions
Hash

Quiz
•
University
20 questions
Digital Forensics

Quiz
•
University
18 questions
IT Essentials Ch 13 Review - Security

Quiz
•
9th Grade - University
12 questions
Cyberecurity Ess 2

Quiz
•
University
19 questions
004_Non-repudiation - CompTIA Security+ SY0-701 - 1.2

Quiz
•
12th Grade - University
20 questions
Hashing

Quiz
•
University
21 questions
Information Security Quiz

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade