CSF Practice - Chapter 4 to 7

CSF Practice - Chapter 4 to 7

9th - 12th Grade

29 Qs

quiz-placeholder

Similar activities

Struktur data dan validitas Sumber Data

Struktur data dan validitas Sumber Data

10th Grade

25 Qs

Form 1 - Information Technology Quiz

Form 1 - Information Technology Quiz

7th Grade - University

32 Qs

Selection of cloud technologies

Selection of cloud technologies

10th Grade - University

26 Qs

CA4 Review: Enhancing Web Pages with Graphics

CA4 Review: Enhancing Web Pages with Graphics

11th Grade

30 Qs

Module 1: Explaining Network Topologies - PRETEST M1.2

Module 1: Explaining Network Topologies - PRETEST M1.2

11th Grade

25 Qs

Net+ CertMaster Section 1.1 Test

Net+ CertMaster Section 1.1 Test

11th Grade

24 Qs

Introduction to DBMS Concepts

Introduction to DBMS Concepts

12th Grade

25 Qs

Ulangan Harian Informatika Kelas 9

Ulangan Harian Informatika Kelas 9

9th Grade

25 Qs

CSF Practice - Chapter 4 to 7

CSF Practice - Chapter 4 to 7

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Used 1+ times

FREE Resource

29 questions

Show all answers

1.

MATCH QUESTION

3 mins • 1 pt

Match the terms to their correction explanation. (Chapter 5)

Salting

Random string of characters added to two similar passwords

before hashing resulting in the two passwords having a different

hash result.

HMAC

It is relatively easy to compute but significantly harder to reverse.

Hashing

Combines a cryptographic hash function with a secret key.

2.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

There are many hashing algorithms widely used today. Identify two that are most popular. (Chapter 5)

Message Digest 5 or MD5

Secure Hash Algorithm or SHA

AES (Advanced Encryption Standard)

RSA (Rivest-Shamir-Adleman)

3.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Hashing is a tool that ensures data integrity by using a one-way mathematical function to produce a hash value. Identify all properties of a cryptographic hash function. (Chapter 5)

Input can be any length.

Output has a fixed length.

It is one way and is not reversible.

Two different input values will always result in different hash values.

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Salting is a type of data integrity control use to make hashing more secure. Describe the situation in which salting is used. When two users have the _______ password. (Chapter 5)

5.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Digital signatures provide the same functionality as handwritten signatures for electronic documents. Describe all the functionalities of a digital signature. (Chapter 5)

To determine if it is edited.

To check authenticity.

To check integrity.

Cannot be repudiated.

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Identify the standard used for the construction of digital certificates. (Chapter 5)

Answer explanation

X.509

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Which one of the three principles of security does a digital certificate provides for the receiver? (Chapter 5)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?