How to use the hash & cryptography quiz
- Pick a category or leave it on All categories.
- Click Start Quiz. Each correct answer is explained inline.
- Use the Security+ / CISSP topic coverage as a study checklist.
Security+ / CISSP / CySA+ practice on hashing, salting, HMAC, password storage and crypto pitfalls.
SHA-256 and SHA-512 from the SHA-2 family, plus SHA-3 and BLAKE3. Avoid MD5 and SHA-1 for any security context.
Hashing locks data into a fixed-length fingerprint. You can't reverse it—that's the point. Encryption works the opposite way: it scrambles your data but leaves a key to unscramble it later. Use hashing when you need to prove something hasn't changed. Use encryption when you need to hide it.
Salt is per-user and stops precomputed rainbow-table attacks. Pepper is a server-side secret added to all hashes, kept outside the database, so a DB theft alone doesn't crack hashes.
Authentication. HMAC binds the hash to a shared secret key, so a receiver can verify both integrity and origin — a plain hash proves only that data is unchanged.