Net Quiz 5

Net Quiz 5

11th Grade

19 Qs

quiz-placeholder

Similar activities

Hash Tables Recap

Hash Tables Recap

11th Grade

10 Qs

Exit Ticket - Linked Lists and HashTables

Exit Ticket - Linked Lists and HashTables

11th Grade

12 Qs

Cybersecurity Chapter 5

Cybersecurity Chapter 5

11th Grade

12 Qs

Cyber Security CIW

Cyber Security CIW

11th Grade

12 Qs

AP CSP Unit 8 Review

AP CSP Unit 8 Review

11th Grade

12 Qs

Authentication Quiz

Authentication Quiz

11th Grade - University

15 Qs

CodeHS 5.8 HashMaps

CodeHS 5.8 HashMaps

9th - 12th Grade

10 Qs

CyberSecurity Basics

CyberSecurity Basics

6th - 12th Grade

10 Qs

Net Quiz 5

Net Quiz 5

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Geok Soon Sia

Used 5+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Identify three situations in which the hashing function can be applied. (Choose three.)

DES

PKI

IPsec

WPA

CHAP

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A user has created a new program and wants to distribute it to everyone in the company. The user wants to ensure that when the program is downloaded that the program is not changed while in transit. What can the user do to ensure that the program is not changed when downloaded?

Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.

Turn off antivirus on all the computers.

Distribute the program on a thumb drive.

Encrypt the program and require a password after it is downloaded.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An email sent throughout the company stated that there would be a change in security policy. The security officer who was presumed to have sent the message stated the message was not sent and the company may be a victim of a spoofed email. What could have been added to the message to ensure the message actually came from the person?

non-repudiation

digital signature

asymmetric key

hashing

4.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What are three NIST-approved digital signature algorithms? (Choose three.)

DSA

ECDSA

SHA256

MD5

RSA

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alice and Bob use the same password to login into the company network. This means both would have the exact same hash for their passwords. How to prevent both password hashes from being the same?

peppering

pseudo-random generator

salting

RSA

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the step by step process for creating a digital signature?

Create a message digest; encrypt the digest with the private key of the sender; and bundle the message, encrypted digest, and public key together in order to sign the document.

Create a message digest; encrypt the digest with the public key of the sender; and bundle the message, encrypted digest, and public key together to sign the document.

Create a message; encrypt the message with a MD5 hash; and send the bundle with a public key.

Create a SHA-1 hash; encrypt the hash with the private key of the sender; and bundle the message, encrypted hash, and public key together to signed document.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is a strength of using a hashing function?

It is a one-way function and not reversible.

Two different files can be created that have the same output.

It has a variable length output.

It is not commonly used in security.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?