Join the discussion
Question 1/34
In cryptography, checksums are used to _____.
Correct Answer: D
Explanation: A cryptographic checksum is a digital mathematical value associated with a file and used as a future reference point to verify that the information the file originally contained has not been compromised.
Add Comments
- Other Question (34q)
- Q1. In cryptography, checksums are used to _____.
- Q2. What are two famous black hat 'hacktivist' groups?...
- Q3. Bluesnarfing requires which of these?
- Q4. Strictly speaking, which of the following is NOT a Linux distribution?...
- Q5. Evidence is said to be reliable when _____
- Q6. Asymmetric encryption uses:
- Q7. A phishing attack that incorporates personal information about the user is known as which ...
- Q8. A phishing attack that uses fraudulent websites to capture sensitive information is known ...
- Q9. Class 2 Bluetooth devices have an expected range of _____ ?...
- Q10. Which term is used to describe initial communication between two Bluetooth devices?...
- Q11. Modern encryption is classified as _____ or _____....
- Q12. Which is considered the 'ethical' hacker?
- Q13. _____ is anything that can negatively affect information....
- Q14. Which hacker seeks to steal money, hold computers and network systems for ransom and possi...
- Q15. Which data storage technology stores data temporarily, not permanently, for use by a devic...
- Q16. Which of the following distributions is the oldest?...
- Q17. What is digital evidence?
- Q18. IPv4 requires that every system with connectivity to the Internet have a unique _____ inte...
- Q19. The password for a wireless security network is also known as the _____....
- Q20. Which of the following is NOT direct evidence?...
- Q21. The roots of modern encryption can be traced back almost _____ years....
- Q22. Which of the following social media threats/risks deals with celebrities?...
- Q23. Which of the following is a characteristic of social media?...
- Q24. How can you tell if an account on social media has been compromised?...
- Q25. Digital evidence is said to be authentic when _____....
- Q26. Which of the following is NOT a threat/risk associated with social media?...
- Q27. Encryption is the process of:
- Q28. Copies of originals of digital evidence are used as best evidence to ensure _____....
- Q29. Which of the following terms describes the practice of attempting to acquire sensitive inf...
- Q30. One of the main points of vulnerability of a system is that data in _____ is not encrypted...
- Q31. What is the difference between a 'white hat' and 'grey hat' hacker?...
- Q32. A/An _____ can happen if you're not careful when using public Wi-Fi....
- Q33. What is cryptography?
- Q34. Which of the following is NOT a method for intrusion detection?...
