Brian computes the digest of a single sentence of text using a SHA-2 hash function. He then changes a single character of the sentence and computes the hash value again. Which one of the following statements is true about the new hash value?

Cryptography Quiz

Quiz
•
Information Technology (IT)
•
Professional Development
•
Easy
Daniel Belay
Used 3+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The new hash value will be one character different from the old hash value.
The new hash value will share at least 50 percent of the characters of the old hash value.
The new hash value will be unchanged.
The new hash value will be completely different from the old hash value.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alan believes that an attacker is collecting information about the electricity consumption of a sensitive cryptographic device and using that information to compromise encrypted data. What type of attack does he suspect is taking place?
Brute-force
Side-channel
Known plaintext
Frequency analysis
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If Richard wants to send an encrypted message to Sue using a public key cryptosystem, which key does he use to encrypt the message?
Richard's public key
Richard's private key
Sue's public key
Sue's private key
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If a 2,048-bit plaintext message were encrypted with the ElGamal public key cryptosystem, how long would the resulting ciphertext message be?
1,024 bits
2,048 bits
4,096 bits
8,192 bits
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Acme Widgets currently uses a 3,072-bit RSA encryption standard companywide. The company plans to convert from RSA to an elliptic curve cryptosystem. If the company wants to maintain the same cryptographic strength, what ECC key length should it use?
256 bits
512 bits
1,024 bits
2,048 bits
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
John wants to produce a message digest of a 2,048-byte message he plans to send to Mary. If he uses the SHA-2 hashing algorithm, what is a possible size for the message digest generated?
160 bits
512 bits
1,024 bits
2,048 bits
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After conducting a survey of encryption technologies used in her organization, Melissa suspects that some may be out of date and pose security risks. Which one of the following technologies is considered flawed and should no longer be used?
SHA-3
TLS 1.3
IPSec
SSL 3.0
Create a free account and access millions of resources
Similar Resources on Quizizz
21 questions
Remote Support and Scripting Best Practices

Quiz
•
Professional Development
15 questions
Cybersecurity Core Functions

Quiz
•
Professional Development
15 questions
cyber Security Awareness

Quiz
•
Professional Development
25 questions
Simulacro Examen Final

Quiz
•
Professional Development
15 questions
Quiz sobre Camadas do Modelo OSI

Quiz
•
Professional Development
15 questions
Database Concepts Quiz

Quiz
•
Professional Development
20 questions
CB-Quiz On AWS_IAM USER

Quiz
•
Professional Development
20 questions
Chapter 10: Incident Detection and Analysis

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade