Hash Functions Quiz

Hash Functions Quiz

12th Grade

21 Qs

quiz-placeholder

Similar activities

Struktur Data

Struktur Data

9th - 12th Grade

20 Qs

Digital Solutions Revision

Digital Solutions Revision

12th Grade

20 Qs

Cryptography

Cryptography

9th - 12th Grade

20 Qs

Uses of hashing 1

Uses of hashing 1

11th - 12th Grade

21 Qs

Cybersecurity Essentials

Cybersecurity Essentials

9th Grade - University

20 Qs

2.3 - Searching Algorithms

2.3 - Searching Algorithms

11th - 12th Grade

23 Qs

Cryptography Quiz

Cryptography Quiz

12th Grade

20 Qs

ICS Mini Semester Review 1

ICS Mini Semester Review 1

9th - 12th Grade

25 Qs

Hash Functions Quiz

Hash Functions Quiz

Assessment

Quiz

Computers

12th Grade

Easy

Created by

gabyy gh

Used 2+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a hash function?

Sort data in ascending order

Encrypt data for secure transmission

Generate random numbers

Convert a numerical input value into another compressed numerical value

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the output length of a hash function?

Infinite length

Fixed length

Variable length

Arbitrary length

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the values returned by a hash function called?

Message digest

Hash values

Checksums

Digital signatures

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two are direct applications of hash functions?

Password Storage

Fingerprinting

Collision Resistance

Data Integrity Check

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What property of a hash function makes it hard to find a message that produces a given hash?

Collision resistance

Second pre-image resistance

Pre-image resistance

Avalanche effect

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of a birthday attack?

To find two different input messages that produce the same hash value

To increase the output size of a hash function

To celebrate someone's birthday

To prevent hash collisions

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can the risk of a birthday attack be mitigated?

Use a hash function with a smaller output size

Use the same cryptographic technique

Use a salt

Use a single hash function

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?