Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

9th - 12th Grade

16 Qs

quiz-placeholder

Similar activities

Introduction to Cybersecurity

Introduction to Cybersecurity

11th - 12th Grade

20 Qs

Authentication Quiz

Authentication Quiz

11th Grade - University

15 Qs

1.3.1 Compression, Encryption and Hashing

1.3.1 Compression, Encryption and Hashing

11th Grade

20 Qs

Module 8 - VPN and IPsec Concepts Review

Module 8 - VPN and IPsec Concepts Review

12th Grade

20 Qs

Cybersecurity Chapter 5

Cybersecurity Chapter 5

11th Grade

12 Qs

Exit Ticket - Linked Lists and HashTables

Exit Ticket - Linked Lists and HashTables

11th Grade

12 Qs

Cyber Security CIW

Cyber Security CIW

11th Grade

12 Qs

PLTW Cybersecurity

PLTW Cybersecurity

11th - 12th Grade

20 Qs

Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Hashing and Digital Signatures - CompTIA Security+ SY0-701 - 1.4

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Wayground Content

Used 2+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique is used to ensure data integrity?

Encryption

Hashing

Compression

Encoding

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary use of digital signatures?

To verify message authenticity and integrity

To encrypt data for secure transmission

To create digital copies of physical documents

To enhance the speed of data transfer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of adding a salt to a password hash?

To prevent rainbow table attacks

To increase the length of the password

To encrypt the password

To store the password securely

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is the MD5 algorithm no longer recommended?

It is vulnerable to collisions

It is the fastest hashing algorithm

It is widely used in modern applications

It has a longer hash output than SHA-256

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A primary requirement for a good cryptographic hash function is that the function should not have collisions. A collision in a hash function is when:

two inputs map to the same output.

one input produces multiple outputs.

the output is longer than the input.

the hash function is reversible.

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

In a scenario where Michael is sending confidential documents to William, what does integrity ensure about the documents during transmission?

Data is accurate and untampered

Data is encrypted and secure

Data is compressed for faster transmission

Data is accessible to all parties involved

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which hashing algorithm is known for producing a 256-bit output?

MD5

SHA1

SHA256

RIPEMD-160

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?