

MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
A larger hash code cannot be decomposed into independent subcodes. |
A. | True |
B. | False |
Answer» C. | |
2. |
Case b ( refer Figure 1 From The chapter Message Authentication Codes in William Stallings )is an example of digital signature. |
A. | True |
B. | False |
Answer» B. False | |
3. |
The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key. |
A. | True |
B. | False |
Answer» C. | |
4. |
A larger hash code cannot be decomposed into independent subcodes? |
A. | True |
B. | False |
Answer» C. | |
5. |
If the compression function is collision resistant, then so is the resultant iterated hash function. |
A. | True |
B. | False |
Answer» B. False | |
6. |
Which one of the following is not an application hash functions? |
A. | One-way password file |
B. | Key wrapping |
C. | Virus Detection |
D. | Intrusion detection |
Answer» C. Virus Detection | |
7. |
What is a one-way password file? |
A. | A scheme in which the password is jumbled and stored |
B. | A scheme in which the password is XOR with a key and stored |
C. | A scheme in which the hash of the password is stored |
D. | A scheme in which the password is passed through a PRF, which is then stored |
Answer» D. A scheme in which the password is passed through a PRF, which is then stored | |
8. |
The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.$ |
A. | True |
B. | False |
Answer» C. | |
9. |
Message authentication code is also known as |
A. | key code |
B. | hash code |
C. | keyed hash function |
D. | message key hash function |
Answer» D. message key hash function | |
10. |
When a hash function is used to provide message authentication, the hash function value is referred to as |
A. | Message Field |
B. | Message Digest |
C. | Message Score |
D. | Message Leap |
Answer» C. Message Score | |