Back to Overview
This assessment questionnaire gives you the opportunity to verifiy your learning progress. Thank you for taking this course!
Does password-based encryption require asymmetric encryption algorithms?
One of the most used secure password to key derivation algorithms is called:
Which of these are common hash functions?
Which elements of a secure hashing scheme mitigate brute-force attacks on password hashes?
What is the best way to create a secure hashing scheme for your application?
ZIP-based AES encryption is broken.
Which crypto schemes are supported by CrococryptFile?
Which AES key length in bits is used by CrococryptFile by default?
What does CrococryptFile's headerless encryption mean?
Submit Answers