MCQOPTIONS
Saved Bookmarks
This section includes 9 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What is the value of opad in the HMAC structure? |
| A. | 00111110 |
| B. | 00110010 |
| C. | 10110110 |
| D. | 01011100 |
| Answer» E. | |
| 2. |
K2 is derived by left shifting L by 2 bits. What is L defined as? |
| A. | E(K , 0<sup>b</sup>) |
| B. | E(K , 10*<sup>b</sup>) |
| C. | E(K , 1<sup>b</sup>) |
| D. | E(K , 10*1<sup>b</sup>) |
| Answer» B. E(K , 10*<sup>b</sup>) | |
| 3. |
In CMAC, which scenario is a different key K2 is used instead of K1? |
| A. | If the tag is larger than the key length |
| B. | If the tag is shorter than the key length |
| C. | In the last step of the algorithm |
| D. | If the plaintext/message is not an integer multiple of the cipher clock length |
| Answer» E. | |
| 4. |
Which cryptographic algorithm is used in CMAC? |
| A. | Triple DES and AES |
| B. | DES |
| C. | RC-4 |
| D. | AES |
| Answer» B. DES | |
| 5. |
What is the full-form of CMAC? |
| A. | Code-based MAC |
| B. | Cipher-based MAC |
| C. | Construct-based MAC |
| D. | Collective-based MAC |
| Answer» C. Construct-based MAC | |
| 6. |
Which mode of operation is used in the DAA? |
| A. | output feedback mode |
| B. | electronic code block mode |
| C. | cipher block chaining mode |
| D. | cipher feedback mode |
| Answer» D. cipher feedback mode | |
| 7. |
Data Authentication Algorithm (DAA) is based on |
| A. | DES |
| B. | AES |
| C. | MD-5 |
| D. | SHA-1 |
| Answer» B. AES | |
| 8. |
What is the value of ipad in the HMAC structure? |
| A. | 00111110 |
| B. | 00110010 |
| C. | 10110110 |
| D. | 01110110 |
| Answer» C. 10110110 | |
| 9. |
Cryptographic hash functions execute faster in software than block ciphers. |
| A. | Statement is correct |
| B. | Statement is incorrect |
| C. | Depends on the hash function |
| D. | Depends on the processor |
| Answer» E. | |