17. Cryptographic Hashes and Digital Signatures Quiz

17. Cryptographic Hashes and Digital Signatures Quiz

Professional Development

8 Qs

quiz-placeholder

Similar activities

Data Structure

Data Structure

Professional Development

13 Qs

Blockchain Basics: Algorithms

Blockchain Basics: Algorithms

University - Professional Development

9 Qs

Java Collections

Java Collections

Professional Development

14 Qs

Post Test - Sharing Session Keamanan Infrastruktur TI

Post Test - Sharing Session Keamanan Infrastruktur TI

Professional Development

10 Qs

IT General Control

IT General Control

Professional Development

10 Qs

Java_4

Java_4

Professional Development

6 Qs

python file handling

python file handling

Professional Development

10 Qs

Adobe Acrobat I

Adobe Acrobat I

Professional Development

10 Qs

17. Cryptographic Hashes and Digital Signatures Quiz

17. Cryptographic Hashes and Digital Signatures Quiz

Assessment

Interactive Video

Professional Development

Professional Development

Easy

Created by

Jennifer Clark

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a cryptographic hash primarily used for?

Compressing data

Encrypting data

Representing data as a short string of text

Generating random numbers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of a cryptographic hash?

It can be used to recreate the original data

It provides data integrity

It is a fixed-size string

It is unique for different inputs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the output size of the SHA-256 hashing algorithm?

64 bits

512 bits

256 bits

128 bits

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is the MD5 hashing algorithm no longer recommended?

It is difficult to implement

It is too slow

It produces very large hashes

It has collision problems

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you verify that a downloaded file matches the original file posted on a website?

By checking the file extension

By opening the file and visually inspecting it

By running a hashing algorithm on the downloaded file and comparing the hash with the one posted on the website

By comparing file sizes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of adding a salt to a password before hashing it?

To ensure that the same password generates different hashes for different users

To encrypt the password

To make the password easier to remember

To make the password longer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a digital signature provide?

Authentication and integrity

Data redundancy

Compression

Encryption

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the process of verifying a digital signature, what is used to decrypt the signature?

The recipient's private key

The sender's private key

The recipient's public key

The sender's public key