MCQOPTIONS
Saved Bookmarks
This section includes 11 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
In GCM, we define S as S = GHASH(A||0v||C||0u||[len(A)]||[len(C)]). What is u defined as?a) 64 ceil[len(A)/128] – len(A)b) 64 ceil[len(C)/128] – len(C)c) 128 ceil[len(A)/128] – len( |
| A. | 64 ceil[len(A)/128] – len(A) |
| B. | 64 ceil[len(C)/128] – len(C) |
| C. | 128 ceil[len(A)/128] – len(A) |
| D. | 128 ceil[len(C)/128] – len(C) |
| Answer» E. | |
| 2. |
What does the following figure represent? |
| A. | GCM (Galois Counter MAC) |
| B. | GCTR ( part of GCM) |
| C. | GHASH ( hash algorithm of GCM) |
| D. | None of the mentionedView Answer |
| Answer» D. None of the mentionedView Answer | |
| 3. |
Hashing followed by encryption (H→E) is used by which algorithm? |
| A. | IPSec |
| B. | SSH |
| C. | WEP |
| D. | SSL/TLS |
| Answer» D. SSL/TLS | |
| 4. |
Which Authentication Encryption approach is taken by the SSH protocol?a) Hashing followed by encryption (H→E)b) Encryption followed by authentication (E→A)c) Authentication followed by encryption (A→E)d) Independently encrypt and authenticate (E + |
| A. | Hashing followed by encryption (H→E) |
| B. | Encryption followed by authentication (E→A) |
| C. | Authentication followed by encryption (A→E) |
| D. | Independently encrypt and authenticate (E + A) |
| Answer» E. | |
| 5. |
Which Authentication Encryption approach is taken by the IPSec protocol?a) Authentication followed by encryption (A→E)b) Hashing followed by encryption (H→E)c) Encryption followed by authentication (E→A)d) Independently encrypt and authenticate (E + |
| A. | Authentication followed by encryption (A→E) |
| B. | Hashing followed by encryption (H→E) |
| C. | Encryption followed by authentication (E→A) |
| D. | Independently encrypt and authenticate (E + A) |
| Answer» D. Independently encrypt and authenticate (E + A) | |
| 6. |
Which Authentication Encryption approach is taken by the SSL/TLS protocol?a) Hashing followed by encryption (H→E)b) Encryption followed by authentication (E→A)c) Authentication followed by encryption (A→E)d) Independently encrypt and authenticate (E + |
| A. | Hashing followed by encryption (H→E) |
| B. | Encryption followed by authentication (E→A) |
| C. | Authentication followed by encryption (A→E) |
| D. | Independently encrypt and authenticate (E + A) |
| Answer» D. Independently encrypt and authenticate (E + A) | |
| 7. |
How many passes through the plaintext does the CCM require to generate the MAC value? |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» B. 3 | |
| 8. |
Which of the following terms is not an input to the CCM encryption? |
| A. | Nonce. |
| B. | Associated data. |
| C. | Plaintext message. |
| D. | Tag. |
| Answer» E. | |
| 9. |
Hashing followed by encryption (H‚ÜíE) is used by which algorithm?$ |
| A. | IPSec |
| B. | SSH |
| C. | WEP |
| D. | SSL/TLS |
| Answer» D. SSL/TLS | |
| 10. |
Which Authentication Encryption approach is taken by the IPSec protocol? |
| A. | Authentication followed by encryption (A‚ÜíE) |
| B. | Hashing followed by encryption (H‚ÜíE) |
| C. | Encryption followed by authentication (E‚ÜíA) |
| D. | Independently encrypt and authenticate (E + A) |
| Answer» D. Independently encrypt and authenticate (E + A) | |
| 11. |
Which Authentication Encryption approach is taken by the SSL/TLS protocol? |
| A. | Hashing followed by encryption (H‚ÜíE) |
| B. | Encryption followed by authentication (E‚ÜíA) |
| C. | Authentication followed by encryption (A‚ÜíE) |
| D. | Independently encrypt and authenticate (E + A) |
| Answer» D. Independently encrypt and authenticate (E + A) | |