Hashing, Integrity & Attacks |Verified Questions with A+
Graded Rationales Latest Updated 2026
The standard hash function works by taking a _______ input and producing a ______output.
variable, variable
fixed, variable
variable, fixed
fixed, fixed
Hashing involves creating a _____ function which cannot be ______.
two-way, verified
two-way, reversed
one-way, reversed
signing, verified
From the list below, which choices are most in line with the the purpose of hashing. Select two.
Protect confidentiality
Protect integrity
Allows you to check whether a file has been changed
Allows you to check whether a file has been viewed
An instance where two different pieces of data are hashed separately, but both result in a single
identical hash value is described by what term?
Collision
Null Value
Avalanche
Digest
A ___ attack on a hash can take advantage of similar content, or instances where part of the
message has some significance to the original, and generates the same hash signature.
, Full context
Collision
Pre-image
Dictionary
The birthday paradox concept is employed in the birthday attack on hashes in effort to identify a
_____ of a given hash.
collision
anomaly
change
LSB
A pre-compiled list of hash values for possible passwords is called a ______ and is used in
cracking efforts by attackers.
Rainbow table
Lookup table
Block list
Bash compiler
From the list below, which term is best described as random bits added to a password hash to
help with safeguarding passwords in storage?
CRC
Rounds
Salt
Rainbow Table
______ is a hash generator option for passwords that uses salt to create a non-recurrent hash.
Ha$her
Noesis
Bcrypt
Arcsight