nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #366

CERTIFIED-IN-CYBERSECURITY Question #366: Real Exam Question with Answer & Explanation

The correct answer is A: A cryptographic key is required. A cryptographic key is not associated with a hashing algorithm (see ISC2 Study Guide, Module 1, under Encryption Overview). Hashing algorithms generate a digital representation of digital data known as a hash. Hashes are usually used to compare data by comparing the hashes only.

Security Principles

Question

What attribute is NOT associated with a hashing algorithm?

Options

  • AA cryptographic key is required
  • BIt is difficult to find two messages with the same hash value
  • CThey are irreversible
  • DThey take variable-length input

Explanation

A cryptographic key is not associated with a hashing algorithm (see ISC2 Study Guide, Module 1, under Encryption Overview). Hashing algorithms generate a digital representation of digital data known as a hash. Hashes are usually used to compare data by comparing the hashes only. They are irreversible, meaning generating the original data from the hash is impossible. Finding two inputs with the same h should be difficult (collision). Hashing algorithms take variable-length input, meaning the algorithm can process long and short notes. However, the hashing algorithm's output is always the same length. The remaining options are incorrect because a cryptographic key is not associated with a hashing algorithm, hashes are irreversible, finding two messages with the same hash value is difficult, and hashing algorithms take variable-length input.

Topics

#Hashing Algorithms#Cryptographic Hashes#Hash Function Properties

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions