Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

9th Grade - University

20 Qs

quiz-placeholder

Similar activities

1.4.2 Data Structures

1.4.2 Data Structures

11th Grade

20 Qs

IAS QUIZ 12

IAS QUIZ 12

University

25 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

CryptoQuiz

CryptoQuiz

University

15 Qs

Hash

Hash

University

20 Qs

MTA - Mobility and Devices Fundamentals Part 1

MTA - Mobility and Devices Fundamentals Part 1

10th Grade - Professional Development

20 Qs

Cybersecurity: Ch 5 & 6

Cybersecurity: Ch 5 & 6

9th - 12th Grade

21 Qs

Q3 SemEx

Q3 SemEx

9th - 12th Grade

25 Qs

Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

Assessment

Quiz

Life Skills, Computers

9th Grade - University

Medium

Created by

Paul Zettler

Used 51+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This strategy for cracking a has attempts every possible code until a match is found.

brute force

dictionary

rainbow table

lookup table

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This type of attack against a hash attempts the common words, phrases, and passwords in a language.

brute force

dictionary

rainbow table

lookup table

3.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Select the two basic hash algorithms listed below. (Pick2)

Message Digest 5

Secure Hash Algorithm - 1

HMAC

WPA

4.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

Select the situations listed below when hashing should be used. (Select all that apply!)

When you need to ensure file integrity.

PKI Certificates

IPsec Protocols

Routing Authentication

Challenge Response Protocols (CHAP)

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

Which of the following does NOT accurately describe hashing.

One way math function

Fixed Output Length

Fixed Input Length

Two different inputs almost never give the same output

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is how HMAC is different from other basic hash algorithms.

One way math function

Fixed Output Length

Requires a secret key along with the message digest

Variable Input Length

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is the purpose of CSPRNG

Perform hash calculations

Encrypt data

Generate Salts

Concatenate Strings in Programming

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?