CERTIFIED-IN-CYBERSECURITY · Question #366
CERTIFIED-IN-CYBERSECURITY Question #366: Real Exam Question with Answer & Explanation
The correct answer is A: A cryptographic key is required. A cryptographic key is not associated with a hashing algorithm (see ISC2 Study Guide, Module 1, under Encryption Overview). Hashing algorithms generate a digital representation of digital data known as a hash. Hashes are usually used to compare data by comparing the hashes only.
Question
What attribute is NOT associated with a hashing algorithm?
Options
- AA cryptographic key is required
- BIt is difficult to find two messages with the same hash value
- CThey are irreversible
- DThey take variable-length input
Explanation
A cryptographic key is not associated with a hashing algorithm (see ISC2 Study Guide, Module 1, under Encryption Overview). Hashing algorithms generate a digital representation of digital data known as a hash. Hashes are usually used to compare data by comparing the hashes only. They are irreversible, meaning generating the original data from the hash is impossible. Finding two inputs with the same h should be difficult (collision). Hashing algorithms take variable-length input, meaning the algorithm can process long and short notes. However, the hashing algorithm's output is always the same length. The remaining options are incorrect because a cryptographic key is not associated with a hashing algorithm, hashes are irreversible, finding two messages with the same hash value is difficult, and hashing algorithms take variable-length input.
Topics
Community Discussion
No community discussion yet for this question.