
CSF Practice - Chapter 4 to 7
Information Technology (IT)
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
29 questions
Show all answers
1.
MATCH QUESTION
3 mins • 1 pt
Match the terms to their correction explanation. (Chapter 5)
Hashing
Combines a cryptographic hash function with a secret key.
HMAC
Random string of characters added to two similar passwords
before hashing resulting in the two passwords having a different
hash result.
Salting
It is relatively easy to compute but significantly harder to reverse.
2.
MULTIPLE SELECT QUESTION
3 mins • 1 pt
There are many hashing algorithms widely used today. Identify two that are most popular. (Chapter 5)
Message Digest 5 or MD5
Secure Hash Algorithm or SHA
AES (Advanced Encryption Standard)
RSA (Rivest-Shamir-Adleman)
3.
MULTIPLE SELECT QUESTION
3 mins • 1 pt
Hashing is a tool that ensures data integrity by using a one-way mathematical function to produce a hash value. Identify all properties of a cryptographic hash function. (Chapter 5)
Input can be any length.
Output has a fixed length.
It is one way and is not reversible.
Two different input values will always result in different hash values.
4.
FILL IN THE BLANKS QUESTION
3 mins • 1 pt
Salting is a type of data integrity control use to make hashing more secure. Describe the situation in which salting is used. When two users have the (a) password. (Chapter 5)
5.
MULTIPLE SELECT QUESTION
3 mins • 1 pt
Digital signatures provide the same functionality as handwritten signatures for electronic documents. Describe all the functionalities of a digital signature. (Chapter 5)
To determine if it is edited.
To check authenticity.
To check integrity.
Cannot be repudiated.
6.
FILL IN THE BLANKS QUESTION
3 mins • 1 pt
Identify the standard used for the construction of digital certificates. (Chapter 5)
(a)
Answer explanation
X.509
7.
FILL IN THE BLANKS QUESTION
3 mins • 1 pt
Which one of the three principles of security does a digital certificate provides for the receiver? (Chapter 5)
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?