IAS QUIZ 11

IAS QUIZ 11

University

25 Qs

quiz-placeholder

Similar activities

Cryptography Basics

Cryptography Basics

University

20 Qs

Hashing and Collision

Hashing and Collision

University

21 Qs

IAS CH3 QUIZ

IAS CH3 QUIZ

University

25 Qs

ASD - Strutture dati

ASD - Strutture dati

University

20 Qs

Compiler Design

Compiler Design

University

20 Qs

Fundamentals of Programming C++

Fundamentals of Programming C++

9th Grade - University

20 Qs

Programming concepts in c - Quizizz-III

Programming concepts in c - Quizizz-III

University

20 Qs

221 quiz03

221 quiz03

University

23 Qs

IAS QUIZ 11

IAS QUIZ 11

Assessment

Quiz

Computers

University

Easy

Created by

Darwin Vargas

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virtually all cryptographic hash functions involve the iterative use of a compression function.

T

F

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.

F

T

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hash functions can be used for intrusion and virus detections.

T

F

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The cryptographic hash function is not a versatile cryptographic algorithm.

F

T

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

it is possible to use a hash function but no encryption for message authentication.

T

F

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hash functions are commonly used to create a one-way password file.

T

F

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.

T

F

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?