
IAS QUIZ 11
Authored by Darwin Vargas
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Virtually all cryptographic hash functions involve the iterative use of a compression function.
T
F
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.
F
T
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hash functions can be used for intrusion and virus detections.
T
F
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The cryptographic hash function is not a versatile cryptographic algorithm.
F
T
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
it is possible to use a hash function but no encryption for message authentication.
T
F
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hash functions are commonly used to create a one-way password file.
T
F
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.
T
F
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?