ICTDBS506- HASHES, SALTS, PEPPERS Quiz

ICTDBS506- HASHES, SALTS, PEPPERS Quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

CyberSecurity

CyberSecurity

Professional Development

13 Qs

How Cyber Secure Are You?

How Cyber Secure Are You?

Professional Development

12 Qs

Be Wary of Phishing

Be Wary of Phishing

Professional Development

10 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

Chapter 2:The Cybersecurity Cube

Chapter 2: The Cybersecurity Cube

Professional Development

12 Qs

Pop Quiz 1

Pop Quiz 1

Professional Development

16 Qs

Prevention

Prevention

1st Grade - Professional Development

10 Qs

Blockchain Day 2 Final Quiz

Blockchain Day 2 Final Quiz

Professional Development

10 Qs

ICTDBS506- HASHES, SALTS, PEPPERS Quiz

ICTDBS506- HASHES, SALTS, PEPPERS Quiz

Assessment

Passage

Computers

Professional Development

Hard

Created by

David Hunt

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hashing algorithm?

A complex mathematical function that transforms data into a fixed length output string.

A tool for encrypting data that can be easily decrypted.

A method for storing passwords in plain text.

A database of common passwords and their hashes.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is hashing considered a form of one-way encryption?

Because you cannot go backwards from a hash to work out the original string.

Because it scrambles data temporarily.

Because the hash can easily be converted back to the original string using a key.

Because it uses a complex key to encrypt data.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of using salts in password storage?

To append to the end of passwords for added security.

To encrypt the password in the database.

To make it easier to guess the password.

To thwart rainbow table attacks by adding randomness.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a rainbow table?

A type of hashing algorithm.

A tool for encrypting passwords.

A colorful table used in cryptography.

A database containing common passwords and their hashes.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can attackers potentially decode hashed passwords?

By using a strong encryption algorithm.

By asking the user for their password.

By comparing the hash to a database of known hashes.

By using a key to decrypt the hash.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a pepper in password hashing?

To make brute force attacks more computationally expensive.

To replace the use of salts.

To encrypt the hash further with a key.

To store it along with the hash for added security.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are salts generally stored in plain text alongside the hashed output?

To reduce the security of the stored passwords.

Because it is a requirement of all hashing algorithms.

So the website knows what salt to use when verifying a login.

To make it easier for attackers to guess the password.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?