How to use the hash & cryptography quiz
- Pick a category or leave it on All categories.
- Click Start Quiz. Each correct answer is explained inline.
- Use the Security+ / CISSP topic coverage as a study checklist.
Security+ / CISSP / CySA+ practice on hashing, salting, HMAC, password storage and crypto pitfalls.
SHA-256 and SHA-512 from the SHA-2 family, plus SHA-3 and BLAKE3. Avoid MD5 and SHA-1 for any security context.
Hashing is one-way and produces a fixed-length digest. Encryption is reversible with a key and preserves the input data. Hashes verify integrity; encryption protects confidentiality.
Salt is per-user and stops precomputed rainbow-table attacks. Pepper is a server-side secret added to all hashes, kept outside the database, so a DB theft alone does not crack hashes.
Authentication. HMAC binds the hash to a shared secret key, so a receiver can verify both integrity and origin — a plain hash proves only that data is unchanged.