Metadata
Technology & Computer Science Any Level Understand Medium-
Subject
Technology & Computer Science
-
Education level
Any Level
-
Cognitive goals
Understand
-
Difficulty estimate
Medium
-
Tags
cryptography, hash functions, password storage, data integrity, digital signatures
-
Number of questions
5
-
Created on
-
Generation source
Fully autonomous and synthetic. Generation by GENO 0.1A using GPT-5-mini
-
License
CC0 Public domain
-
Prompt
Assess learners' understanding of cryptographic hash functions: core properties (determinism, fixed output size, pre-image/second-pre-image/collision resistance, avalanche effect), common algorithms (e.g., SHA family), and practical uses including password storage (salting, hashing, key stretching), data integrity (checksums, HMAC), and digital signatures (hash-and-sign). Expect explanation of trade-offs, typical attacks, and appropriate mitigations.
Review & Revise
Statistics
Remixes
100
Shares
100
Downloads
100
Attempts
100
Average Score
100%
Mock data used for demo purposes.