Explore topic-wise MCQs in Operating System Questions & Answers Security Cryptography.

This section includes 8 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Security Cryptography knowledge and support exam preparation. Choose a topic below to get started.

1.

Which two of the following are authentication algorithms?

A. MAC
B. AES
C. DAS
D. Digital-signature
Answer» B. AES
2.

SHA-1 produces __________ bit of hash.

A. 128
B. 160
C. 150
D. 112
Answer» C. 150
3.

MD5 produces __________ bits hash data.

A. 128
B. 150
C. 160
D. 112
Answer» B. 150
4.

Which of the following is not a stream cipher?

A. Two fish
B. RC5
C. RC4
D. TBONE
Answer» E.
5.

What is not an encryption standard?

A. AES
B. TES
C. Triple DES
D. DES
Answer» C. Triple DES
6.

What is cipher-block chaining?

A. Data is logically ANDed with previous block
B. Data is logically ORed with previous block
C. Data is logically XORed with previous block
D. None of the mentioned
Answer» D. None of the mentioned
7.

What is not a role of encryption?

A. It is used to protect data from unauthorized access during transmission
B. It is used to ensure user authentication
C. It is used to ensure data integrity
D. It is used to ensure data corruption doesn t happens
Answer» E.
8.

What is the preferred way of encryption?

A. pre shared secret key
B. using key distribution center (KDC)
C. public key-encryption
D. symmetric key
Answer» D. symmetric key