11. How is hashing different from encryption?
- Hashing operations are one-directional.
- It is less secure.
- It is faster.
- Hashing is meant for large amounts of data while encryption is meant for small amounts of data.
12. What is a hash collision?
- When two different files generate the same hash digest.
- When a hash digest is reversed to recover the original.
- When two identical files generate different hash digests.
- When two different hashing algorithms produce the same hash.
13. How is a Message Integrity Check (MIC) different from a Message Authentication Code (MAC)?
- A MIC only hashes the message while a MAC incorporates a secret key.
- They’re the same thing.
- A MAC requires a password while a MIC does not.
- A MIC is more reliable than a MAC.
14. How can one defend against brute-force password attacks? Check all that apply.
- Incorporate salts into password hashing.
- Run passwords through the hashing function multiple times.
- Enforce the use of strong passwords.
- Store passwords in a rainbow table.
15. ______ is a type of function or operation that takes in an arbitrary data input and maps it to an output of a fixed size, called a hash or a digest.
- Phishing
- A hash function
- Cryptography
- Secure key exchange