

Understanding Cryptographic Hashes and Digital Signatures
Interactive Video
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Hard
Mia Campbell
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a cryptographic hash primarily used for?
Representing data as a short string
Compressing files
Generating random numbers
Encrypting data
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a minor change in input affect a SHA-256 hash?
It makes the hash longer
It has no effect on the hash
It produces a completely different hash
It results in a slightly different hash
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is the MD5 hashing algorithm no longer recommended?
It has collision problems
It is too slow
It produces too large hashes
It is not compatible with modern systems
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of adding a salt to a password hash?
To make the hash shorter
To prevent hash collisions
To make it harder to reverse-engineer the hash
To encrypt the password
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you verify that a downloaded file is authentic?
By opening it in a text editor
By comparing its hash with the one on the website
By running an antivirus scan
By checking its file size
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a digital signature ensure about a message?
It is compressed
It is free of viruses
It is from a trusted source
It is encrypted
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which key is used to create a digital signature?
Public key
Private key
Symmetric key
Session key
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?