Explore topic-wise MCQs in Cryptography and Network Security.

This section includes 11 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

In GCM, we define S as S = GHASH(A||0v||C||0u||[len(A)]||[len(C)]). What is u defined as?a) 64 ceil[len(A)/128] – len(A)b) 64 ceil[len(C)/128] – len(C)c) 128 ceil[len(A)/128] – len(

A. 64 ceil[len(A)/128] – len(A)
B. 64 ceil[len(C)/128] – len(C)
C. 128 ceil[len(A)/128] – len(A)
D. 128 ceil[len(C)/128] – len(C)
Answer» E.
2.

What does the following figure represent?

A. GCM (Galois Counter MAC)
B. GCTR ( part of GCM)
C. GHASH ( hash algorithm of GCM)
D. None of the mentionedView Answer
Answer» D. None of the mentionedView Answer
3.

Hashing followed by encryption (H→E) is used by which algorithm?

A. IPSec
B. SSH
C. WEP
D. SSL/TLS
Answer» D. SSL/TLS
4.

Which Authentication Encryption approach is taken by the SSH protocol?a) Hashing followed by encryption (H→E)b) Encryption followed by authentication (E→A)c) Authentication followed by encryption (A→E)d) Independently encrypt and authenticate (E +

A. Hashing followed by encryption (H→E)
B. Encryption followed by authentication (E→A)
C. Authentication followed by encryption (A→E)
D. Independently encrypt and authenticate (E + A)
Answer» E.
5.

Which Authentication Encryption approach is taken by the IPSec protocol?a) Authentication followed by encryption (A→E)b) Hashing followed by encryption (H→E)c) Encryption followed by authentication (E→A)d) Independently encrypt and authenticate (E +

A. Authentication followed by encryption (A→E)
B. Hashing followed by encryption (H→E)
C. Encryption followed by authentication (E→A)
D. Independently encrypt and authenticate (E + A)
Answer» D. Independently encrypt and authenticate (E + A)
6.

Which Authentication Encryption approach is taken by the SSL/TLS protocol?a) Hashing followed by encryption (H→E)b) Encryption followed by authentication (E→A)c) Authentication followed by encryption (A→E)d) Independently encrypt and authenticate (E +

A. Hashing followed by encryption (H→E)
B. Encryption followed by authentication (E→A)
C. Authentication followed by encryption (A→E)
D. Independently encrypt and authenticate (E + A)
Answer» D. Independently encrypt and authenticate (E + A)
7.

How many passes through the plaintext does the CCM require to generate the MAC value?

A. 2
B. 3
C. 4
D. 5
Answer» B. 3
8.

Which of the following terms is not an input to the CCM encryption?

A. Nonce.
B. Associated data.
C. Plaintext message.
D. Tag.
Answer» E.
9.

Hashing followed by encryption (H‚ÜíE) is used by which algorithm?$

A. IPSec
B. SSH
C. WEP
D. SSL/TLS
Answer» D. SSL/TLS
10.

Which Authentication Encryption approach is taken by the IPSec protocol?

A. Authentication followed by encryption (A‚ÜíE)
B. Hashing followed by encryption (H‚ÜíE)
C. Encryption followed by authentication (E‚ÜíA)
D. Independently encrypt and authenticate (E + A)
Answer» D. Independently encrypt and authenticate (E + A)
11.

Which Authentication Encryption approach is taken by the SSL/TLS protocol?

A. Hashing followed by encryption (H‚ÜíE)
B. Encryption followed by authentication (E‚ÜíA)
C. Authentication followed by encryption (A‚ÜíE)
D. Independently encrypt and authenticate (E + A)
Answer» D. Independently encrypt and authenticate (E + A)