

MCQOPTIONS
Saved Bookmarks
This section includes 9 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
What is the value of opad in the HMAC structure? |
A. | 00111110 |
B. | 00110010 |
C. | 10110110 |
D. | 01011100 |
Answer» E. | |
2. |
K2 is derived by left shifting L by 2 bits. What is L defined as? |
A. | E(K , 0<sup>b</sup>) |
B. | E(K , 10*<sup>b</sup>) |
C. | E(K , 1<sup>b</sup>) |
D. | E(K , 10*1<sup>b</sup>) |
Answer» B. E(K , 10*<sup>b</sup>) | |
3. |
In CMAC, which scenario is a different key K2 is used instead of K1? |
A. | If the tag is larger than the key length |
B. | If the tag is shorter than the key length |
C. | In the last step of the algorithm |
D. | If the plaintext/message is not an integer multiple of the cipher clock length |
Answer» E. | |
4. |
Which cryptographic algorithm is used in CMAC? |
A. | Triple DES and AES |
B. | DES |
C. | RC-4 |
D. | AES |
Answer» B. DES | |
5. |
What is the full-form of CMAC? |
A. | Code-based MAC |
B. | Cipher-based MAC |
C. | Construct-based MAC |
D. | Collective-based MAC |
Answer» C. Construct-based MAC | |
6. |
Which mode of operation is used in the DAA? |
A. | output feedback mode |
B. | electronic code block mode |
C. | cipher block chaining mode |
D. | cipher feedback mode |
Answer» D. cipher feedback mode | |
7. |
Data Authentication Algorithm (DAA) is based on |
A. | DES |
B. | AES |
C. | MD-5 |
D. | SHA-1 |
Answer» B. AES | |
8. |
What is the value of ipad in the HMAC structure? |
A. | 00111110 |
B. | 00110010 |
C. | 10110110 |
D. | 01110110 |
Answer» C. 10110110 | |
9. |
Cryptographic hash functions execute faster in software than block ciphers. |
A. | Statement is correct |
B. | Statement is incorrect |
C. | Depends on the hash function |
D. | Depends on the processor |
Answer» E. | |