

MCQOPTIONS
Saved Bookmarks
This section includes 11 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
In GCM, we define S as S = GHASH(A||0v||C||0u||[len(A)]||[len(C)]). What is u defined as?a) 64 ceil[len(A)/128] – len(A)b) 64 ceil[len(C)/128] – len(C)c) 128 ceil[len(A)/128] – len( |
A. | 64 ceil[len(A)/128] – len(A) |
B. | 64 ceil[len(C)/128] – len(C) |
C. | 128 ceil[len(A)/128] – len(A) |
D. | 128 ceil[len(C)/128] – len(C) |
Answer» E. | |
2. |
What does the following figure represent? |
A. | GCM (Galois Counter MAC) |
B. | GCTR ( part of GCM) |
C. | GHASH ( hash algorithm of GCM) |
D. | None of the mentionedView Answer |
Answer» D. None of the mentionedView Answer | |
3. |
Hashing followed by encryption (H→E) is used by which algorithm? |
A. | IPSec |
B. | SSH |
C. | WEP |
D. | SSL/TLS |
Answer» D. SSL/TLS | |
4. |
Which Authentication Encryption approach is taken by the SSH protocol?a) Hashing followed by encryption (H→E)b) Encryption followed by authentication (E→A)c) Authentication followed by encryption (A→E)d) Independently encrypt and authenticate (E + |
A. | Hashing followed by encryption (H→E) |
B. | Encryption followed by authentication (E→A) |
C. | Authentication followed by encryption (A→E) |
D. | Independently encrypt and authenticate (E + A) |
Answer» E. | |
5. |
Which Authentication Encryption approach is taken by the IPSec protocol?a) Authentication followed by encryption (A→E)b) Hashing followed by encryption (H→E)c) Encryption followed by authentication (E→A)d) Independently encrypt and authenticate (E + |
A. | Authentication followed by encryption (A→E) |
B. | Hashing followed by encryption (H→E) |
C. | Encryption followed by authentication (E→A) |
D. | Independently encrypt and authenticate (E + A) |
Answer» D. Independently encrypt and authenticate (E + A) | |
6. |
Which Authentication Encryption approach is taken by the SSL/TLS protocol?a) Hashing followed by encryption (H→E)b) Encryption followed by authentication (E→A)c) Authentication followed by encryption (A→E)d) Independently encrypt and authenticate (E + |
A. | Hashing followed by encryption (H→E) |
B. | Encryption followed by authentication (E→A) |
C. | Authentication followed by encryption (A→E) |
D. | Independently encrypt and authenticate (E + A) |
Answer» D. Independently encrypt and authenticate (E + A) | |
7. |
How many passes through the plaintext does the CCM require to generate the MAC value? |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
8. |
Which of the following terms is not an input to the CCM encryption? |
A. | Nonce. |
B. | Associated data. |
C. | Plaintext message. |
D. | Tag. |
Answer» E. | |
9. |
Hashing followed by encryption (H‚ÜíE) is used by which algorithm?$ |
A. | IPSec |
B. | SSH |
C. | WEP |
D. | SSL/TLS |
Answer» D. SSL/TLS | |
10. |
Which Authentication Encryption approach is taken by the IPSec protocol? |
A. | Authentication followed by encryption (A‚ÜíE) |
B. | Hashing followed by encryption (H‚ÜíE) |
C. | Encryption followed by authentication (E‚ÜíA) |
D. | Independently encrypt and authenticate (E + A) |
Answer» D. Independently encrypt and authenticate (E + A) | |
11. |
Which Authentication Encryption approach is taken by the SSL/TLS protocol? |
A. | Hashing followed by encryption (H‚ÜíE) |
B. | Encryption followed by authentication (E‚ÜíA) |
C. | Authentication followed by encryption (A‚ÜíE) |
D. | Independently encrypt and authenticate (E + A) |
Answer» D. Independently encrypt and authenticate (E + A) | |