
Net Quiz 5
Authored by Geok Soon Sia
Computers
11th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Identify three situations in which the hashing function can be applied. (Choose three.)
DES
PKI
IPsec
WPA
CHAP
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?
Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.
Turn off antivirus on all the computers.
Distribute the program on a thumb drive.
Encrypt the program and require a password after it is downloaded.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
An email sent throughout the company stated that there would be a change in security policy. The security officer who was presumed to have sent the message stated the message was not sent and the company may be a victim of a spoofed email. What could have been added to the message to ensure the message actually came from the person?
non-repudiation
digital signature
asymmetric key
hashing
4.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What are three NIST-approved digital signature algorithms? (Choose three.)
DSA
ECDSA
SHA256
MD5
RSA
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Alice and Bob use the same password to login into the company network. This means both would have the exact same hash for their passwords. How to prevent both password hashes from being the same?
peppering
pseudo-random generator
salting
RSA
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is the step by step process for creating a digital signature?
Create a message digest; encrypt the digest with the private key of the sender; and bundle the message, encrypted digest, and public key together in order to sign the document.
Create a message digest; encrypt the digest with the public key of the sender; and bundle the message, encrypted digest, and public key together to sign the document.
Create a message; encrypt the message with a MD5 hash; and send the bundle with a public key.
Create a SHA-1 hash; encrypt the hash with the private key of the sender; and bundle the message, encrypted hash, and public key together to signed document.
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is a strength of using a hashing function?
It is a one-way function and not reversible.
Two different files can be created that have the same output.
It has a variable length output.
It is not commonly used in security.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?