walker.michael75
walker.michael75 1d ago β€’ 0 views

File Hashing Quiz: Test Your Cybersecurity Knowledge

Hey there, future cybersecurity pro! πŸ‘‹ Ready to test your knowledge of file hashing? It's super important for keeping our data safe and sound. Check out the quick study guide, then jump into the quiz! Good luck! πŸ€
πŸ’» Computer Science & Technology

1 Answers

βœ… Best Answer
User Avatar
donaldharris1995 Dec 31, 2025

πŸ“š Quick Study Guide

  • πŸ”‘ Hashing Basics: File hashing involves using an algorithm to create a fixed-size bit string (the hash) from a file. This hash acts like a digital fingerprint.
  • πŸ›‘οΈ Integrity Check: Hashing verifies file integrity. If the hash changes, the file has been altered.
  • πŸ”₯ Common Algorithms: Examples include MD5, SHA-1, SHA-256, and SHA-512. SHA-256 and SHA-512 are generally preferred for better security.
  • πŸ“ Hash Function Properties: A good hash function should be pre-image resistant (difficult to find the original input from the hash), second pre-image resistant (difficult to find a different input with the same hash as a given input), and collision resistant (difficult to find two different inputs that produce the same hash).
  • ⚠️ Collision Concerns: Although rare, hash collisions can occur, where different files produce the same hash. Longer hash lengths (e.g., SHA-256) reduce the likelihood of collisions.
  • πŸ’‘ Applications: Used in software distribution (verifying downloads), password storage (storing hashes instead of passwords), and data integrity checks.

Practice Quiz

  1. Which of the following is the primary purpose of file hashing?
    1. A. To encrypt the file.
    2. B. To compress the file.
    3. C. To verify the integrity of the file.
    4. D. To hide the file.
  2. Which of the following is NOT a desirable property of a cryptographic hash function?
    1. A. Pre-image resistance.
    2. B. Second pre-image resistance.
    3. C. Collision resistance.
    4. D. High speed of computation, even if it compromises security.
  3. Which hashing algorithm is generally considered more secure?
    1. A. MD5
    2. B. SHA-1
    3. C. SHA-256
    4. D. CRC32
  4. What is a 'collision' in the context of hashing?
    1. A. When a hash function is too slow.
    2. B. When two different inputs produce the same hash value.
    3. C. When a hash function fails to produce an output.
    4. D. When a file is encrypted using a hash function.
  5. Which of the following is a common application of file hashing?
    1. A. Compressing images.
    2. B. Verifying the integrity of downloaded software.
    3. C. Playing video games.
    4. D. Sending emails.
  6. Why are passwords often stored as hashes instead of plain text?
    1. A. To save storage space.
    2. B. To make them easier to remember.
    3. C. To enhance security by making them unreadable if the database is compromised.
    4. D. To allow users to reset their passwords easily.
  7. Which of the following is the best definition of pre-image resistance?
    1. A. It is easy to find an input that produces a specific hash output.
    2. B. It is difficult to find an input that produces a specific hash output.
    3. C. It is impossible to find any input for a hash function.
    4. D. It guarantees there will be no collisions.
Click to see Answers
  1. C
  2. D
  3. C
  4. B
  5. B
  6. C
  7. B

Join the discussion

Please log in to post your answer.

Log In

Earn 2 Points for answering. If your answer is selected as the best, you'll get +20 Points! πŸš€