11. How is hashing different from encryption?

  • Hashing operations are one-directional.
  • It is less secure.
  • It is faster.
  • Hashing is meant for large amounts of data while encryption is meant for small amounts of data.

12. What is a hash collision?

  • When two different files generate the same hash digest.
  • When a hash digest is reversed to recover the original.
  • When two identical files generate different hash digests.
  • When two different hashing algorithms produce the same hash.

13. How is a Message Integrity Check (MIC) different from a Message Authentication Code (MAC)?

  • A MIC only hashes the message while a MAC incorporates a secret key.
  • They’re the same thing.
  • A MAC requires a password while a MIC does not.
  • A MIC is more reliable than a MAC.

14. How can one defend against brute-force password attacks? Check all that apply.

  • Incorporate salts into password hashing.
  • Run passwords through the hashing function multiple times.
  • Enforce the use of strong passwords.
  • Store passwords in a rainbow table.

15. ______ is a type of function or operation that takes in an arbitrary data input and maps it to an output of a fixed size, called a hash or a digest.

  • Phishing
  • A hash function
  • Cryptography
  • Secure key exchange

Devendra Kumar

Project Management Apprentice at Google

Leave a Reply