Section 25 Hashing Flashcards

1
Q

A one way cryptographic function which takes on input and produces a unique message digest.

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Algorithm that creates a fixed length 128 bit hash value unique to the input file.

A

Message Digest 5 (MD 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Condition that occurs when two different files create the same hash digest.

A

Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Algorithm that creates a fixed length 160 bit hash value unique to the input file.

A

Secure Hash Algorithm (SHA-1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Family of algorithms that includes SHA-224, SHA-256, SHA-348, and SHA 512.

A

Secure Hash Algorithm (SHA-2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Family of algorithms that creates hash digests between 224 bits and 512 bits.

A

Secure Hash Algorithm (SHA-3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An open source hash algorithm that creates a unique 160 bit, 256 bits, or 320 bit message digest for each input file.

A

RACE Integrity Primitive Evaluation Message Digest (RIPEMD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uses a hash algorithm to create a level of assurance as to the integrity and authenticity of a given messages or file.

A

Hash Based Message Authentication Code (HMAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Uses digital signatures to provide an assurance that the software code has not been modified after it was submitted by the developer.

A

Code Signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Original version of password hashing used by windows that uses DES and is limited to 14 characters.

A

LAN MAN (LM Hash)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LM hash instead of requiring the associated plaintext password.

A

Pass the Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A penetration testing tool used to automate the harvesting of hashes and conducting the pass the hash attack

A

Mimikatz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Technique used by an attacker to find two different message that have the same identical hash digest.

A

Birthday Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technique that is used to mitigate a weaker key to increasing the time needed to crack it.

A

Key Stretching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adding random data into a one way cryptographic hash to help protect against passwords cracking techniques.

A

Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly