Types of Data Integrity Controls - Hashing Algorithms
Hashing is a tool that ensures ____ _________ by taking binary data (the message)
and producing a fixed-length representation called the hash value or message digest.
Revision for Chapter 5
Quiz
•
Computers
•
University
•
Medium
Kevin Wong
Used 1+ times
FREE Resource
16 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Types of Data Integrity Controls - Hashing Algorithms
Hashing is a tool that ensures ____ _________ by taking binary data (the message)
and producing a fixed-length representation called the hash value or message digest.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Hashing is a one-way mathematical function that is relatively
____ __ _______, but significantly harder to reverse.
Grinding coffee beans is a good analogy of a one-way function.
It is easy to grind coffee beans, but it is almost impossible to put all of the
tiny pieces back together to rebuild the original beans.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A cryptographic hash function has the following properties:
1st property: The input can be any length.
2nd property: The output has a fixed length.
3rd property: The hash function is one way and is not reversible.
4th property: Two different input values will always result in _________ hash values.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
A cryptographic hash function has the following properties:
1st property: The input can be any length.
2nd property: The output has a _____ length.
3rd property: The hash function is one way and is not reversible.
4th property: Two different input values will always result in different hash values.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
There are many modern hashing algorithms widely used today. Two of the most popular are MD5 and SHA.
_______ ______ _ (MD5) Algorithm - is a hash algorithm developed by Ron Rivest that produces a 128-bit hash value.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
There are many modern hashing algorithms widely used today. Two of the most popular are MD5 and SHA.
_____ ____ _________ (SHA) – was developed by the U.S. National Institute of Standards and Technology (NIST) and can be implemented in different strengths:
SHA-224 (224 bit)
SHA-256 (256 bit)
SHA-384 (384 bit)
SHA-512 (512 bit)
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Salting is a type of data integrity control use to make hashing more secure.
Describe the situation in which salting is used.
Answer: When the two users have the ____ password.
20 questions
Cybersecurity Essentials Chapter 5 Review
Quiz
•
9th Grade - University
20 questions
Cybersecurity Essentials Chapter 2 Review
Quiz
•
9th Grade - University
20 questions
Hashing
Quiz
•
University
21 questions
Information Security Quiz
Quiz
•
University
13 questions
Digital Signeture
Quiz
•
University
18 questions
IT Essentials Ch 13 Review - Security
Quiz
•
9th Grade - University
20 questions
Digital Forensics
Quiz
•
University
12 questions
Cyberecurity Ess 2
Quiz
•
University
15 questions
Character Analysis
Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing
Quiz
•
9th - 12th Grade
10 questions
American Flag
Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
30 questions
Linear Inequalities
Quiz
•
9th - 12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25
Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers
Quiz
•
6th - 8th Grade