7.3.6 Section Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate?

HMAC

Which of the following is the weakest hashing algorithm?

MD5

An attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or she has. Which type of attack is the attacker using?

Rainbow

You have just downloaded a file. You create a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?

Your copy is the same as the copy posted on the website.

When two different messages produce the same hash value, what has occurred?

Collision

Hashing algorithms are used to perform which of the following activities?

Create a message digest.

Which of the following is used to verify that a downloaded file has not been altered?

Hash

A birthday attack focuses on which of the following?

Hashing algorithms

Which of the following does not or cannot produce a hash value of 128 bits?

SHA-1

What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?

Salting


Ensembles d'études connexes

Help Desk Customer Service Quiz #4(2)

View Set

FIN Ch. 14, Working capital and current assets management

View Set

Head and Spine Injuries Ch.29 Hw

View Set

NCLEX-PN Maternal and Women's Health Nursing EAQ questions and answers

View Set