CSF Practice - Chapter 4 to 7

CSF Practice - Chapter 4 to 7

9th - 12th Grade

29 Qs

quiz-placeholder

Similar activities

HSDE EDPM Diagnostic Test

HSDE EDPM Diagnostic Test

11th Grade

25 Qs

Module 1: Explaining Network Topologies - PRETEST M1.2

Module 1: Explaining Network Topologies - PRETEST M1.2

11th Grade

25 Qs

Computer Basics

Computer Basics

9th - 12th Grade

25 Qs

Computer Basics Pre test

Computer Basics Pre test

9th Grade

24 Qs

Computer Science Examination Paper A - Allowed Items

Computer Science Examination Paper A - Allowed Items

12th Grade

33 Qs

CSS 12 Week 1 PETA 1

CSS 12 Week 1 PETA 1

12th Grade

33 Qs

Cyber Crime and Cyber Security Quiz

Cyber Crime and Cyber Security Quiz

12th Grade

25 Qs

Review - Microsoft Word 2019 Expert

Review - Microsoft Word 2019 Expert

10th Grade

25 Qs

CSF Practice - Chapter 4 to 7

CSF Practice - Chapter 4 to 7

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Used 1+ times

FREE Resource

29 questions

Show all answers

1.

MATCH QUESTION

3 mins • 1 pt

Match the terms to their correction explanation. (Chapter 5)

Salting

Combines a cryptographic hash function with a secret key.

Hashing

It is relatively easy to compute but significantly harder to reverse.

HMAC

Random string of characters added to two similar passwords

before hashing resulting in the two passwords having a different

hash result.

2.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

There are many hashing algorithms widely used today. Identify two that are most popular. (Chapter 5)

Message Digest 5 or MD5

Secure Hash Algorithm or SHA

AES (Advanced Encryption Standard)

RSA (Rivest-Shamir-Adleman)

3.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Hashing is a tool that ensures data integrity by using a one-way mathematical function to produce a hash value. Identify all properties of a cryptographic hash function. (Chapter 5)

Input can be any length.

Output has a fixed length.

It is one way and is not reversible.

Two different input values will always result in different hash values.

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Salting is a type of data integrity control use to make hashing more secure. Describe the situation in which salting is used. When two users have the _______ password. (Chapter 5)

5.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Digital signatures provide the same functionality as handwritten signatures for electronic documents. Describe all the functionalities of a digital signature. (Chapter 5)

To determine if it is edited.

To check authenticity.

To check integrity.

Cannot be repudiated.

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Identify the standard used for the construction of digital certificates. (Chapter 5)

Answer explanation

X.509

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Which one of the three principles of security does a digital certificate provides for the receiver? (Chapter 5)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?