Hashing Flashcards

1
Q

A one-way cryptographic function which takes an input and produces a
unique message digest

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Algorithm that creates a fixed-length 128-bit hash value unique to the
input file

A

Message Digest 5 (MD5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Condition that occurs when two different files create the same hash
digest

A

Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Algorithm that creates a fixed-length 160-bit hash value unique to the
input file

A

Secure Hash Algorithm (SHA-1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Family of algorithms that includes SHA-224, SHA-256, SHA-348, and
SHA512

A

Secure Hash Algorithm (SHA-2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Family of algorithms that creates hash digests between 224-bits and 512-
bits

A

Secure Hash Algorithm (SHA-3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An open-source hash algorithm that creates a unique 160-bit, 256-bit, or
320-bit message digest for each input file

A

RACE Integrity Primitive Evaluation Message Digest (RIPEMD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uses a hash algorithm to create a level of assurance as to the integrity
and authenticity of a given message or file

A

Hash-based Message Authentication Code (HMAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Uses digital signatures to provide an assurance that the software code
has not been modified after it was submitted by the developer

A

Code Signing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Original version of password hashing used by Windows that uses DES and
is limited to 14 characters

A

LANMAN( LM Hash)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Replacement for LM Hash that uses RC4 and was released with Windows
NT 3.1 in 1993

A

NT LAN Manager Hash (NTLM Hash)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Replacement for NTLM Hash that uses HMAC-MD5 and is considered
difficult to crack

A

NTLMv2 Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When asked about integrity think of what?

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technique that allows an attacker to authenticate to a remote server or
service by using the underlying NTLM or LM hash instead of requiring the
associated plaintext password

A

Pass the hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A penetration testing tool used to automate the harvesting of
hashes and conducting the Pass the Hash attack

A

Mimikatz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Technique used by an attacker to find two different messages that have
the same identical hash digest

A

Birthday Attack

17
Q

A technique that is used to mitigate a weaker key by increasing the time
needed to crack it

A

Key Stretching

18
Q

Adding random data into a one-way cryptographic hash to help protect
against password cracking techniques

A

Salting