9-9 Hashing Algorithms

25 July 2022
4.7 (114 reviews)
10 test answers

Unlock all answers in this set

Unlock answers (6)
question
hashing algorithms are used to perform what activity
answer
create a message Digest
question
which of the following best describes High amplification when apply to the hashing algorithms
answer
a small change in the message results in a big change in the hash value
question
which of the following is the strongest hashing algorithm
answer
sha - 1
question
which of the following is the weakest hashing algorithm
answer
md5
question
sha - 1 uses which of the following bit length hashing algorithms
answer
only 160 bit
question
which of the following does not or cannot produce a hash value of 128 bits
answer
sha - 1
question
birthday attack focuses on what
answer
hashing algorithms
question
when two different messages produce the same hash value what has occurred
answer
Collision
question
which of the following is used to verify that it downloaded file has not been altered
answer
hash
question
you have just downloaded a file you create a hash of a file and compare to the hash posted on the website the two hashes match what do you know about the file
answer
your copy is the same as a copy posted on the website