CIS230_5.4_Hashing_Lab

docx

School

ECPI University, Greensboro *

*We aren’t endorsed by this school

Course

230

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by corada5995

Report
Task Summary Lab Questions v Use the get-filehash Release.zip -a md5 command v Use the get-content release821hash.txt command v/ Use the -eq command to compare the hashes v Q7: Do the file hashes match? Your answer: No Correct answer: No 1. View the files in the C:\Downloads folder. a. Right-click Start and select Windows PowerShell (Admin). b. At the prompt, type cd C:\downloads and press Enter to navigate to the directory that contains the files. c. Type dir and press Enter to view the available files. 2. Confirm that the Release.zip file is unaltered. a. Type get-filehash Release.zip -a md5 and press Enter to view the MD5 hash. b. Type get-content release821hash.txt and press Enter to view the known hash contained in the .txt file. c. Type "new hash" -eq "known hash" and press Enter to determine whether the file hashes match. The new hash is the hash generated by the get-filehash file_name -a md5 command. The known hash is the hash generated by the get-content file_name.txt command. Include the quotation marks and the file extensions with the file names in the commands. 3. Answer the question. a. In the top right, select Answer Questions. b. Answer the question. c. Select Score Lab. A birthday attack focuses on which of the following? VPN links = Hashing algorithms E-commerce Encrypted files
An attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or she has. Which type of attack is the attacker using? RIPEMD = Rainbow Brute force Cracking When two different messages produce the same hash value, what has occurred? High amplification = Collision Birthday attack Hash value Hashing algorithms are used to perform which of the following activities? Encrypt bulk data for communications exchange. = Create a message digest. Provide a means for exchanging small amounts of data securely over a public network. Provide for non-repudiation.
Which of the following is used to verify that a downloaded file has not been altered? Asymmetric encryption Symmetric encryption = Hash Private key You have just downloaded a file. You create a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file? Your copy is the same as the copy posted on the website. You are the only one able to open the downloaded file. No one has read the file contents as it was downloaded. You can prove the source of the file. Which of the following does not or cannot produce a hash value of 128 bits? RIPEMD MD2 = (@) SHA-T MD5
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Which of the following is a message authentication code that allows a user to verify that a file or message is legitimate? RIPEMD = HMAC SHA MD5 What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called? =4 Salting Avalanche Collision Deterministic Which of the following is the weakest hashing algorithm? AES SHA-1 = MD5 DES