Search Header Logo

CSF Practice - Chapter 4 to 7

Information Technology (IT)

9th - 12th Grade

Used 1+ times

CSF Practice - Chapter 4 to 7
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

29 questions

Show all answers

1.

MATCH QUESTION

3 mins • 1 pt

Match the terms to their correction explanation. (Chapter 5)

HMAC

Combines a cryptographic hash function with a secret key.

Salting

It is relatively easy to compute but significantly harder to reverse.

Hashing

Random string of characters added to two similar passwords

before hashing resulting in the two passwords having a different

hash result.

2.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

There are many hashing algorithms widely used today. Identify two that are most popular. (Chapter 5)

Message Digest 5 or MD5

Secure Hash Algorithm or SHA

AES (Advanced Encryption Standard)

RSA (Rivest-Shamir-Adleman)

3.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Hashing is a tool that ensures data integrity by using a one-way mathematical function to produce a hash value. Identify all properties of a cryptographic hash function. (Chapter 5)

Input can be any length.

Output has a fixed length.

It is one way and is not reversible.

Two different input values will always result in different hash values.

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Salting is a type of data integrity control use to make hashing more secure. Describe the situation in which salting is used. When two users have the _______ password. (Chapter 5)

5.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Digital signatures provide the same functionality as handwritten signatures for electronic documents. Describe all the functionalities of a digital signature. (Chapter 5)

To determine if it is edited.

To check authenticity.

To check integrity.

Cannot be repudiated.

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Identify the standard used for the construction of digital certificates. (Chapter 5)

Answer explanation

X.509

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Which one of the three principles of security does a digital certificate provides for the receiver? (Chapter 5)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?