CSF Practice - Chapter 4 to 7

CSF Practice - Chapter 4 to 7

9th - 12th Grade

29 Qs

quiz-placeholder

Similar activities

Kuis Kecerdasan Buatan

Kuis Kecerdasan Buatan

10th Grade

25 Qs

Computer Security Risks: Prevention & Mitigation Quiz

Computer Security Risks: Prevention & Mitigation Quiz

12th Grade

33 Qs

Kuis Hak Cipta dan Era Digital

Kuis Hak Cipta dan Era Digital

9th Grade - University

25 Qs

UJIAN AKHIR KELAS X.6

UJIAN AKHIR KELAS X.6

10th Grade

26 Qs

Computer Basics Pre test

Computer Basics Pre test

9th Grade

24 Qs

Threats and Attack Surfaces

Threats and Attack Surfaces

10th Grade

27 Qs

JavaScript Qui1 M1-M3

JavaScript Qui1 M1-M3

12th Grade

25 Qs

PENILAIAN HARIAN INFORMATIKA 8_REKAM JEJAK DIGITAL

PENILAIAN HARIAN INFORMATIKA 8_REKAM JEJAK DIGITAL

8th Grade - University

25 Qs

CSF Practice - Chapter 4 to 7

CSF Practice - Chapter 4 to 7

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Used 1+ times

FREE Resource

29 questions

Show all answers

1.

MATCH QUESTION

3 mins • 1 pt

Match the terms to their correction explanation. (Chapter 5)

HMAC

Combines a cryptographic hash function with a secret key.

Hashing

Random string of characters added to two similar passwords

before hashing resulting in the two passwords having a different

hash result.

Salting

It is relatively easy to compute but significantly harder to reverse.

2.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

There are many hashing algorithms widely used today. Identify two that are most popular. (Chapter 5)

Message Digest 5 or MD5

Secure Hash Algorithm or SHA

AES (Advanced Encryption Standard)

RSA (Rivest-Shamir-Adleman)

3.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Hashing is a tool that ensures data integrity by using a one-way mathematical function to produce a hash value. Identify all properties of a cryptographic hash function. (Chapter 5)

Input can be any length.

Output has a fixed length.

It is one way and is not reversible.

Two different input values will always result in different hash values.

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Salting is a type of data integrity control use to make hashing more secure. Describe the situation in which salting is used. When two users have the _______ password. (Chapter 5)

5.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

Digital signatures provide the same functionality as handwritten signatures for electronic documents. Describe all the functionalities of a digital signature. (Chapter 5)

To determine if it is edited.

To check authenticity.

To check integrity.

Cannot be repudiated.

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Identify the standard used for the construction of digital certificates. (Chapter 5)

Answer explanation

X.509

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

Which one of the three principles of security does a digital certificate provides for the receiver? (Chapter 5)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?