Brian computes the digest of a single sentence of text using a SHA-2 hash function. He then changes a single character of the sentence and computes the hash value again. Which one of the following statements is true about the new hash value?

Cryptography Quiz

Quiz
•
Information Technology (IT)
•
Professional Development
•
Easy
Daniel Belay
Used 3+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The new hash value will be one character different from the old hash value.
The new hash value will share at least 50 percent of the characters of the old hash value.
The new hash value will be unchanged.
The new hash value will be completely different from the old hash value.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Alan believes that an attacker is collecting information about the electricity consumption of a sensitive cryptographic device and using that information to compromise encrypted data. What type of attack does he suspect is taking place?
Brute-force
Side-channel
Known plaintext
Frequency analysis
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If Richard wants to send an encrypted message to Sue using a public key cryptosystem, which key does he use to encrypt the message?
Richard's public key
Richard's private key
Sue's public key
Sue's private key
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If a 2,048-bit plaintext message were encrypted with the ElGamal public key cryptosystem, how long would the resulting ciphertext message be?
1,024 bits
2,048 bits
4,096 bits
8,192 bits
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Acme Widgets currently uses a 3,072-bit RSA encryption standard companywide. The company plans to convert from RSA to an elliptic curve cryptosystem. If the company wants to maintain the same cryptographic strength, what ECC key length should it use?
256 bits
512 bits
1,024 bits
2,048 bits
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
John wants to produce a message digest of a 2,048-byte message he plans to send to Mary. If he uses the SHA-2 hashing algorithm, what is a possible size for the message digest generated?
160 bits
512 bits
1,024 bits
2,048 bits
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
After conducting a survey of encryption technologies used in her organization, Melissa suspects that some may be out of date and pose security risks. Which one of the following technologies is considered flawed and should no longer be used?
SHA-3
TLS 1.3
IPSec
SSL 3.0
Create a free account and access millions of resources
Similar Resources on Quizizz
16 questions
aula 02

Quiz
•
Professional Development
19 questions
Java Collections Framework Quiz 1

Quiz
•
Professional Development
25 questions
cryptography

Quiz
•
Professional Development
15 questions
Microsoft IT Pro Meetup - July

Quiz
•
Professional Development
15 questions
Exploring Computer Networks & The Internet

Quiz
•
Professional Development
20 questions
Automation test

Quiz
•
Professional Development
15 questions
Nusantara Knowledge Forum

Quiz
•
Professional Development
19 questions
JavaWeb - Session08

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade