CSF Practice - Chapter 4 to 7

CSF Practice - Chapter 4 to 7

9th - 12th Grade

29 Qs

quiz-placeholder

Similar activities

Struktur data dan validitas Sumber Data

Struktur data dan validitas Sumber Data

10th Grade

25 Qs

Internet dan Google Workspace

Internet dan Google Workspace

4th Grade - University

25 Qs

Quiz Graf dan Struktur Data 9th

Quiz Graf dan Struktur Data 9th

9th Grade

25 Qs

Berpikir Komputasional

Berpikir Komputasional

9th - 12th Grade

25 Qs

Ulangan Harian Bab 1 TIK kls 9

Ulangan Harian Bab 1 TIK kls 9

9th Grade

25 Qs

packet switching s.d. transmisi digital analog

packet switching s.d. transmisi digital analog

11th Grade - University

25 Qs

5. TEKNOLOGI LAYANAN JARINGAN KELAS 11

5. TEKNOLOGI LAYANAN JARINGAN KELAS 11

11th Grade

25 Qs

CSS REVIEW

CSS REVIEW

11th Grade

24 Qs

CSF Practice - Chapter 4 to 7

CSF Practice - Chapter 4 to 7

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Practice Problem

Medium

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

29 questions

Show all answers

1.

MATCH QUESTION

3 mins • 1 pt

Match the terms to their correction explanation. (Chapter 5)

Salting

Combines a cryptographic hash function with a secret key.

HMAC

It is relatively easy to compute but significantly harder to reverse.

Hashing

Random string of characters added to two similar passwords

before hashing resulting in the two passwords having a different

hash result.

2.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

There are many hashing algorithms widely used today. Identify two that are most popular. (Chapter 5)

Message Digest 5 or MD5

Secure Hash Algorithm or SHA

AES (Advanced Encryption Standard)

RSA (Rivest-Shamir-Adleman)

3.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Hashing is a tool that ensures data integrity by using a one-way mathematical function to produce a hash value. Identify all properties of a cryptographic hash function. (Chapter 5)

Input can be any length.

Output has a fixed length.

It is one way and is not reversible.

Two different input values will always result in different hash values.

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Salting is a type of data integrity control use to make hashing more secure. Describe the situation in which salting is used. When two users have the _______ password. (Chapter 5)

5.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Digital signatures provide the same functionality as handwritten signatures for electronic documents. Describe all the functionalities of a digital signature. (Chapter 5)

To determine if it is edited.

To check authenticity.

To check integrity.

Cannot be repudiated.

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Identify the standard used for the construction of digital certificates. (Chapter 5)

Answer explanation

X.509

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Which one of the three principles of security does a digital certificate provides for the receiver? (Chapter 5)

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?