MCQOPTIONS
 Saved Bookmarks
				This section includes 8 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Security Cryptography knowledge and support exam preparation. Choose a topic below to get started.
| 1. | 
                                    Which two of the following are authentication algorithms? | 
                            
| A. | MAC | 
| B. | AES | 
| C. | DAS | 
| D. | Digital-signature | 
| Answer» B. AES | |
| 2. | 
                                    SHA-1 produces __________ bit of hash. | 
                            
| A. | 128 | 
| B. | 160 | 
| C. | 150 | 
| D. | 112 | 
| Answer» C. 150 | |
| 3. | 
                                    MD5 produces __________ bits hash data. | 
                            
| A. | 128 | 
| B. | 150 | 
| C. | 160 | 
| D. | 112 | 
| Answer» B. 150 | |
| 4. | 
                                    Which of the following is not a stream cipher? | 
                            
| A. | Two fish | 
| B. | RC5 | 
| C. | RC4 | 
| D. | TBONE | 
| Answer» E. | |
| 5. | 
                                    What is not an encryption standard? | 
                            
| A. | AES | 
| B. | TES | 
| C. | Triple DES | 
| D. | DES | 
| Answer» C. Triple DES | |
| 6. | 
                                    What is cipher-block chaining? | 
                            
| A. | Data is logically ANDed with previous block | 
| B. | Data is logically ORed with previous block | 
| C. | Data is logically XORed with previous block | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 7. | 
                                    What is not a role of encryption? | 
                            
| A. | It is used to protect data from unauthorized access during transmission | 
| B. | It is used to ensure user authentication | 
| C. | It is used to ensure data integrity | 
| D. | It is used to ensure data corruption doesn t happens | 
| Answer» E. | |
| 8. | 
                                    What is the preferred way of encryption? | 
                            
| A. | pre shared secret key | 
| B. | using key distribution center (KDC) | 
| C. | public key-encryption | 
| D. | symmetric key | 
| Answer» D. symmetric key | |