MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
A larger hash code cannot be decomposed into independent subcodes. |
| A. | True |
| B. | False |
| Answer» C. | |
| 2. |
Case b ( refer Figure 1 From The chapter Message Authentication Codes in William Stallings )is an example of digital signature. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 3. |
The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key. |
| A. | True |
| B. | False |
| Answer» C. | |
| 4. |
A larger hash code cannot be decomposed into independent subcodes? |
| A. | True |
| B. | False |
| Answer» C. | |
| 5. |
If the compression function is collision resistant, then so is the resultant iterated hash function. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 6. |
Which one of the following is not an application hash functions? |
| A. | One-way password file |
| B. | Key wrapping |
| C. | Virus Detection |
| D. | Intrusion detection |
| Answer» C. Virus Detection | |
| 7. |
What is a one-way password file? |
| A. | A scheme in which the password is jumbled and stored |
| B. | A scheme in which the password is XOR with a key and stored |
| C. | A scheme in which the hash of the password is stored |
| D. | A scheme in which the password is passed through a PRF, which is then stored |
| Answer» D. A scheme in which the password is passed through a PRF, which is then stored | |
| 8. |
The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.$ |
| A. | True |
| B. | False |
| Answer» C. | |
| 9. |
Message authentication code is also known as |
| A. | key code |
| B. | hash code |
| C. | keyed hash function |
| D. | message key hash function |
| Answer» D. message key hash function | |
| 10. |
When a hash function is used to provide message authentication, the hash function value is referred to as |
| A. | Message Field |
| B. | Message Digest |
| C. | Message Score |
| D. | Message Leap |
| Answer» C. Message Score | |