17. Cryptographic Hashes and Digital Signatures Quiz

17. Cryptographic Hashes and Digital Signatures Quiz

Professional Development

8 Qs

quiz-placeholder

Similar activities

Sec+ Quiz 2.0

Sec+ Quiz 2.0

Professional Development

10 Qs

SECURITY AWARENESS

SECURITY AWARENESS

Professional Development

10 Qs

Linux Practice Quiz 4

Linux Practice Quiz 4

Professional Development

12 Qs

Linux Practice Quiz 2

Linux Practice Quiz 2

Professional Development

12 Qs

Security Awareness BPD Bali

Security Awareness BPD Bali

Professional Development

10 Qs

Security

Security

Professional Development

10 Qs

All TechEd Up

All TechEd Up

Professional Development

10 Qs

TalentNext Test Day-13-Core Java Topics

TalentNext Test Day-13-Core Java Topics

Professional Development

10 Qs

17. Cryptographic Hashes and Digital Signatures Quiz

17. Cryptographic Hashes and Digital Signatures Quiz

Assessment

Interactive Video

Professional Development

Professional Development

Easy

Created by

Jennifer Clark

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a cryptographic hash primarily used for?

Compressing data

Encrypting data

Representing data as a short string of text

Generating random numbers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a characteristic of a cryptographic hash?

It can be used to recreate the original data

It provides data integrity

It is a fixed-size string

It is unique for different inputs

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the output size of the SHA-256 hashing algorithm?

64 bits

512 bits

256 bits

128 bits

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is the MD5 hashing algorithm no longer recommended?

It is difficult to implement

It is too slow

It produces very large hashes

It has collision problems

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you verify that a downloaded file matches the original file posted on a website?

By checking the file extension

By opening the file and visually inspecting it

By running a hashing algorithm on the downloaded file and comparing the hash with the one posted on the website

By comparing file sizes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of adding a salt to a password before hashing it?

To ensure that the same password generates different hashes for different users

To encrypt the password

To make the password easier to remember

To make the password longer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a digital signature provide?

Authentication and integrity

Data redundancy

Compression

Encryption

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the process of verifying a digital signature, what is used to decrypt the signature?

The recipient's private key

The sender's private key

The recipient's public key

The sender's public key