Providing Integrity with Hashing Flashcards

1
Q

Md5 hash is how many bits long?

A

128bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SHA-1 hash is how many bits long?

A

160bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do HIDS and anti-virus detect modified system files?

A

They scan the files initially and create and store hashes of them. When they scan them again, they run the hash again and compare the new hashes to the stored ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does Hash-based Message Authentication Code expand on ordinary hashing?

A

The sender and receiver use a shared secret in addition to the hashing algorithm to add randomness to the final hash. Because the shared key is only known between the two parties, when the recipient calculates the hash, by virtue of it matching it means the key had to have been from the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What 2 security protocols often use HMAC?

A

IPSec and TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the maximum hash size that RIPEMD can calculate?

A

320bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two hashes covered in the Sec+ exam that produce 160bit hashes?

A

SHA-1 and HMAC-SHA1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List SHA-2 and 3 hashing lengths

A

224-256-384-512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which SHA version not created by the NSA?

A

SHA-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly