Unit 2 Test Bullshit Flashcards
(153 cards)
What is hashing?
Transforming any key or string of values into another.
Who created Message Digest 5 (MD5) and what value does it create?
Ron Rivest and it produces a 128-bit hash value.
What are the variants of Secure Hash Algorithm SHA?
SHA-224 (224 bit)
SHA-256 (256 bit)
SHA-384 (384 bit)
SHA-512 (512 bit)
What is salting?
Salting adds another layer of security to hashing by allowing the owner to choose a string before hashing starts.
(HMAC) is used for what?
Providing a key input to a hash algorithm to make it more secure.
What do digital signatures provide?
used to determine if someone edits a document after the user signs it, check the authenticity of a message, digital document, or software.
What is a digital certificate?
Enables users and orgs to exchange information securely over the internet.
Equivalent to an electronic passport.
Hash functions are ______________ functions. It is computationally infeasible for two different sets of data to come up with the same output.
one-way
Integrity ensures that data remains unchanged and __________________ by anyone or anything over its entire life cycle.
trustworthy
Because a hash value changes every time data is changed, cryptographic hash values are often called digital ___________________________.
fingerprints
Hashing is relatively easy to compute and equally easy to reverse.
T or F
F
Cryptographic hash functions have the following properties:
a.
The output has a fixed length.
b.
Two different input values will almost never result in the same hash values.
f.
The input can be any length.
g.
The hash function is one way
An 8-bit checksum calculates the hash by converting the message into ____________________ numbers
binary
The 8-bit checksum 2’s complement converts a binary to its opposite value, and then it adds ___________
one
What malware compromised the security of MD5 in 2012?
Flame
SHA is short for what?
secure hash algorithm
MD5 is short for what?
message digest 5
What Cisco command verifies the integrity of IOS images used on Cisco routers?
verify / md5
Hashing is vulnerable to ______________________ attacks and does not provide security to transmitted data.
man-in-the-middle
A _________________________ attack attempts every possible combination of characters up to a given length.
brute-force
A _______________________ attack uses a file containing common words, phrases, and passwords.
dictionary
___________________ creates a different hash result for two users who have the same password.
salting
A ____________________ table stores the pre-computed hashes of passwords in a password dictionary along with the corresponding password.
lookup
CSPRNGs generate a random number that has a high level of randomness and is completely unpredictable, so it is cryptographically secure.
T or F
True