CyberFundamentals Chap5

CyberFundamentals Chap5

University

8 Qs

quiz-placeholder

Similar activities

SSH CS Quiz

SSH CS Quiz

University

10 Qs

Blockchain Basics: Algorithms

Blockchain Basics: Algorithms

University - Professional Development

9 Qs

QuizChapter2

QuizChapter2

University

11 Qs

Chapter 9

Chapter 9

University

9 Qs

Chapter 5 Quiz

Chapter 5 Quiz

University

10 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Decrypt it! Level 2

Decrypt it! Level 2

University

10 Qs

CIS27 Quiz 5 Review Game

CIS27 Quiz 5 Review Game

University

12 Qs

CyberFundamentals Chap5

CyberFundamentals Chap5

Assessment

Quiz

Computers

University

Hard

Created by

Monarjay Malbog

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of ensuring integrity in cybersecurity?

Protecting data from unauthorized access

Ensuring data is accurate and has not been tampered with

Maintaining high availability of systems and services

Preventing malware infections

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following cryptographic techniques is commonly used to ensure data integrity?

Encryption

Steganography

Hashing

Symmetric key exchange

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a digital signature?

A unique identifier assigned to a file

An encrypted message sent to authenticate a user

A cryptographic technique used to verify the authenticity and integrity of a message

A code used to bypass authentication mechanisms

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hashing algorithm is commonly used to ensure integrity in digital signatures and certificates?

SHA-1

MD5

DES

SHA-256

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  • Its strengthens hashing algorithms by using an additional secret key as input to the hash function?

HMAC

Salting

MD5

SHA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hash algorithm developed by Ron Rivest that produces a 128-bit hash value?

HMAC

MD5

SHA

SALTING

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A random string of characters, is an additional input to the password before hashing?

HMAC

SHA

Salting

MD5

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a digital certificate in cybersecurity?

To encrypt sensitive data during transmission

To authenticate the identity of a user or entity

To monitor network traffic for malicious activities

To compress data for efficient storage