IAS QUIZ 11

IAS QUIZ 11

University

25 Qs

quiz-placeholder

Similar activities

Digital Forensics

Digital Forensics

University

20 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

Hashing

Hashing

University

20 Qs

Cyber Security

Cyber Security

University

23 Qs

NETWORK SECURITY

NETWORK SECURITY

University

25 Qs

Information Security Quiz

Information Security Quiz

University

21 Qs

Hashing and Collision

Hashing and Collision

University

21 Qs

018_Blockchain Technology - CompTIA Security+ SY0-701 - 1.4

018_Blockchain Technology - CompTIA Security+ SY0-701 - 1.4

9th Grade - University

23 Qs

IAS QUIZ 11

IAS QUIZ 11

Assessment

Quiz

Computers

University

Easy

Created by

Darwin Vargas

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virtually all cryptographic hash functions involve the iterative use of a compression function.

T

F

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Limited characteristics make it impossible for hash functions to be used to determine whether or not data has changed.

F

T

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hash functions can be used for intrusion and virus detections.

T

F

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The cryptographic hash function is not a versatile cryptographic algorithm.

F

T

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

it is possible to use a hash function but no encryption for message authentication.

T

F

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hash functions are commonly used to create a one-way password file.

T

F

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.

T

F

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?