Identify three situations in which the hashing function can be applied. (Choose three.)

Net Quiz 5

Quiz
•
Computers
•
11th Grade
•
Medium
Geok Soon Sia
Used 5+ times
FREE Resource
19 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
DES
PKI
IPsec
WPA
CHAP
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?
Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.
Turn off antivirus on all the computers.
Distribute the program on a thumb drive.
Encrypt the program and require a password after it is downloaded.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
An email sent throughout the company stated that there would be a change in security policy. The security officer who was presumed to have sent the message stated the message was not sent and the company may be a victim of a spoofed email. What could have been added to the message to ensure the message actually came from the person?
non-repudiation
digital signature
asymmetric key
hashing
4.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
What are three NIST-approved digital signature algorithms? (Choose three.)
DSA
ECDSA
SHA256
MD5
RSA
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Alice and Bob use the same password to login into the company network. This means both would have the exact same hash for their passwords. How to prevent both password hashes from being the same?
peppering
pseudo-random generator
salting
RSA
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is the step by step process for creating a digital signature?
Create a message digest; encrypt the digest with the private key of the sender; and bundle the message, encrypted digest, and public key together in order to sign the document.
Create a message digest; encrypt the digest with the public key of the sender; and bundle the message, encrypted digest, and public key together to sign the document.
Create a message; encrypt the message with a MD5 hash; and send the bundle with a public key.
Create a SHA-1 hash; encrypt the hash with the private key of the sender; and bundle the message, encrypted hash, and public key together to signed document.
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What is a strength of using a hashing function?
It is a one-way function and not reversible.
Two different files can be created that have the same output.
It has a variable length output.
It is not commonly used in security.
Create a free account and access millions of resources
Similar Resources on Quizizz
13 questions
015_Key Exchange - CompTIA Security+ SY0-701 - 1.4

Quiz
•
9th Grade - University
15 questions
Year 12 Programming

Quiz
•
11th - 12th Grade
10 questions
IGCSE Comp Sci - Security revision

Quiz
•
9th - 11th Grade
12 questions
CIW/IBA REVIEW PART-C

Quiz
•
9th - 12th Grade
15 questions
Empowerment Technologies

Quiz
•
KG - 12th Grade
10 questions
Hashing, Digital Signatures and BlockChain Practice Questions

Quiz
•
11th Grade
14 questions
Java HashMap Quiz

Quiz
•
11th Grade
13 questions
1.3.1 - Encryption & Hashing

Quiz
•
8th - 12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade