100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

DRO2 Chapter 3 Knowledge Check – C839v5 & D334 Hashing, Integrity & Attacks |Verified Questions with A+ Graded Rationales Latest Updated 2026

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
01-02-2026
Written in
2025/2026

DRO2 Chapter 3 Knowledge Check – C839v5 & D334 Hashing, Integrity & Attacks |Verified Questions with A+ Graded Rationales Latest Updated 2026 The standard hash function works by taking a _______ input and producing a ______output. variable, variable fixed, variable variable, fixed fixed, fixed Hashing involves creating a _____ function which cannot be ______. two-way, verified two-way, reversed one-way, reversed signing, verified From the list below, which choices are most in line with the the purpose of hashing. Select two. Protect confidentiality Protect integrity Allows you to check whether a file has been changed Allows you to check whether a file has been viewed An instance where two different pieces of data are hashed separately, but both result in a single identical hash value is described by what term? Collision Null Value Avalanche Digest A ___ attack on a hash can take advantage of similar content, or instances where part of the message has some significance to the original, and generates the same hash signature. Full context Collision Pre-image Dictionary The birthday paradox concept is employed in the birthday attack on hashes in effort to identify a _____ of a given hash. collision anomaly change LSB A pre-compiled list of hash values for possible passwords is called a ______ and is used in cracking efforts by attackers. Rainbow table Lookup table Block list Bash compiler From the list below, which term is best described as random bits added to a password hash to help with safeguarding passwords in storage? CRC Rounds Salt Rainbow Table ______ is a hash generator option for passwords that uses salt to create a non-recurrent hash. Ha$her Noesis Bcrypt Arcsight From the list below, which hash option is used in Microsoft Windows environments storing passwords that are fewer than 15 characters long? LM PIX NTFS AES The major improvement NTLM provides over LM is the incorporation of salt to increase security of hashes. True False The ______ format addresses the problems of brute forcing an MD5 hash by incorporating salt, and basically iterates the hash value 1,000 times. This considerably slows an intruder as they try to crack the hashed value. MD5-1K APR1 MAR1 MD1K SHA-1 produces a ____-bit hash value. 128 256 64 160 In the Cisco environment, passwords hashed with the Type 5 method have a hash value of how many bits? 128

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
February 1, 2026
Number of pages
8
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

DRO2 Chapter 3 Knowledge Check – C839v5 & D334
Hashing, Integrity & Attacks |Verified Questions with A+
Graded Rationales Latest Updated 2026
The standard hash function works by taking a _______ input and producing a ______output.

variable, variable

fixed, variable

variable, fixed

fixed, fixed

Hashing involves creating a _____ function which cannot be ______.

two-way, verified

two-way, reversed

one-way, reversed

signing, verified

From the list below, which choices are most in line with the the purpose of hashing. Select two.

Protect confidentiality

Protect integrity

Allows you to check whether a file has been changed

Allows you to check whether a file has been viewed

An instance where two different pieces of data are hashed separately, but both result in a single
identical hash value is described by what term?

Collision

Null Value

Avalanche

Digest

A ___ attack on a hash can take advantage of similar content, or instances where part of the
message has some significance to the original, and generates the same hash signature.

, Full context

Collision

Pre-image

Dictionary

The birthday paradox concept is employed in the birthday attack on hashes in effort to identify a
_____ of a given hash.

collision

anomaly

change

LSB

A pre-compiled list of hash values for possible passwords is called a ______ and is used in
cracking efforts by attackers.

Rainbow table

Lookup table

Block list

Bash compiler

From the list below, which term is best described as random bits added to a password hash to
help with safeguarding passwords in storage?

CRC

Rounds

Salt

Rainbow Table

______ is a hash generator option for passwords that uses salt to create a non-recurrent hash.

Ha$her

Noesis

Bcrypt

Arcsight

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LectAziim Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
2 year
Number of followers
13
Documents
4143
Last sold
3 months ago
Dont stress yourself on study materials .LectAziim got it all

"Unlock your potential with our online writing store! Discover expert guidance, personalized feedback, and tools for every writer's journey. From crafting compelling essays to mastering creative storytelling, our platform offers interactive courses, one-on-one coaching, and resources tailored to your goals. Start writing your success story today with us!"

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions