7.3.6 Section Quiz
Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate?
HMAC
Which of the following is the weakest hashing algorithm?
MD5
An attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or she has. Which type of attack is the attacker using?
Rainbow
You have just downloaded a file. You create a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?
Your copy is the same as the copy posted on the website.
When two different messages produce the same hash value, what has occurred?
Collision
Hashing algorithms are used to perform which of the following activities?
Create a message digest.
Which of the following is used to verify that a downloaded file has not been altered?
Hash
A birthday attack focuses on which of the following?
Hashing algorithms
Which of the following does not or cannot produce a hash value of 128 bits?
SHA-1
What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?
Salting