MCQOPTIONS
Saved Bookmarks
This section includes 62 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Confidentiality can only be provided if we perform message encryption before the MAC generation. |
| A. | True |
| B. | False |
| Answer» C. | |
| 2. |
The following figure has authentication tied to the plaintext- |
| A. | True |
| B. | False |
| Answer» C. | |
| 3. |
The above figure represents internal error control. |
| A. | True |
| B. | FalseView Answer |
| Answer» C. | |
| 4. |
The above figure implements authentication and signature only? |
| A. | True |
| B. | FalseView Answer |
| Answer» B. FalseView Answer | |
| 5. |
The criticality indicator indicates whether an extension can be safely ignored. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 6. |
Which of these systems use timestamps as an expiration date? |
| A. | Public-Key Certificates |
| B. | Public announcements |
| C. | Publicly available directories |
| D. | Public-Key authority |
| Answer» B. Public announcements | |
| 7. |
“Meet in the middle attack” and “man in the middle attack” are the same. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» C. May be | |
| 8. |
Which session key is used for electronic funds transfer and point of sale applications? |
| A. | Data-encrypting key |
| B. | File-encrypting key |
| C. | PIN-encrypting key |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 9. |
Sometimes a simple tag is introduced along with the session key. This tag has 8 bits. Which of the following options is wrong? |
| A. | One bit indicates whether the key is a session key or a master key |
| B. | One bit indicates whether the key can be used for encryption |
| C. | Three bit indicates whether the key can be used for decryption |
| D. | Remaining bits are for future use |
| Answer» D. Remaining bits are for future use | |
| 10. |
Hash Value = H = h(CV)Key Input = Km XOR HCiphertext = E([Km XOR H],Ks)What is CV here? |
| A. | Cipher vector |
| B. | Current vector |
| C. | Control vector |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 11. |
“Meet in the middle attack” is an attack |
| A. | where the timing required for the attack via brute force is drastically reduced |
| B. | where the adversary uses 2 or more machines to decrypt thus trying to reduce the time |
| C. | where messages are intercepted and then either relayed or substituted with another message |
| D. | where cryptanalysis takes lesser time than the brute force decryption |
| Answer» D. where cryptanalysis takes lesser time than the brute force decryption | |
| 12. |
How many add round key functions are present in the Whirlpool algorithm? |
| A. | 16 |
| B. | 18 |
| C. | 11 |
| D. | 10 |
| Answer» D. 10 | |
| 13. |
There’s no known successful attacks made against Whirlpool. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 14. |
The Round Constant is given by S[8(r-1)+j]. What are the limits of ‘r’? |
| A. | 0 <= r <= 11 |
| B. | 0 <= r <= 12 |
| C. | 0 <= r <= 10 |
| D. | 0 <= r <=16 |
| Answer» D. 0 <= r <=16 | |
| 15. |
The 7th row in the 8 × 8 matrix undergoes a ___________ shift. |
| A. | 6 bit |
| B. | 6 byte |
| C. | 7 bit |
| D. | 7 byte |
| Answer» C. 7 bit | |
| 16. |
How many XOR gate operations are involved in the S-box permutation? |
| A. | 12 |
| B. | 8 |
| C. | 16 |
| D. | 4 |
| Answer» B. 8 | |
| 17. |
Which Authentication Encryption approach is taken by the SSH protocol? |
| A. | Hashing followed by encryption (H→E) |
| B. | Encryption followed by authentication (E→A) |
| C. | Authentication followed by encryption (A→E) |
| D. | Independently encrypt and authenticate (E + A) |
| Answer» E. | |
| 18. |
In GCM, we define S as S = GHASH(A||0^v||C||0^u||[len(A)]||[len(C)]). What is v defined as? |
| A. | 64 ceil[len (A)/128] – len (A) |
| B. | 64 ceil[len (C)/128] – len (C) |
| C. | 128 ceil[len (A)/128] – len (A) |
| D. | 128 ceil[len (C)/128] – len (C) |
| Answer» D. 128 ceil[len (C)/128] – len (C) | |
| 19. |
The hash matrix of 8 × 8 is preferred over a 16 × 4 matrix because |
| A. | it is symmetric |
| B. | it is smaller in size |
| C. | it is faster in computation |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 20. |
How many rounds are there in one Whirlpool Iteration? |
| A. | 3 |
| B. | 4 |
| C. | 6 |
| D. | 8 |
| Answer» C. 6 | |
| 21. |
For a 100 bit key and a 32 bit tag, how many possible keys can be produced in the 3rd round? |
| A. | 2^4 |
| B. | 2^32 |
| C. | 2^16 |
| D. | 2^64 |
| Answer» B. 2^32 | |
| 22. |
MACs are also called |
| A. | testword |
| B. | checkword |
| C. | testbits |
| D. | none of the mentioned |
| Answer» E. | |
| 23. |
Publicly Available directory is more secure than which other system? |
| A. | Public-Key Certificates |
| B. | Public announcements |
| C. | Public-Key authority |
| D. | None of the mentioned |
| Answer» C. Public-Key authority | |
| 24. |
Which is the correct representation for session key recovery for the plain text? |
| A. | D ([Km XOR H], E([Km XOR H], Ks) |
| B. | D([Km XOR H],Ks) |
| C. | D ([Km XOR H], E([Km XOR H]) |
| D. | None of the mentioned |
| Answer» B. D([Km XOR H],Ks) | |
| 25. |
What is the size of the key in the algorithm? |
| A. | 256 bits |
| B. | 512 bits |
| C. | 128 bits |
| D. | 1024 bits |
| Answer» C. 128 bits | |
| 26. |
When the Round Constant is given by S[8(r-1)+j]. What are the limits of ‘i’ and ‘j’? |
| A. | i = 1 ; 0 <= j <= 7 |
| B. | i = 0 ; 0 <= j <= 7 |
| C. | 0 <= i <= 7; 0 <= j <= 7 |
| D. | 0 <= i <= 7; j=0 |
| Answer» C. 0 <= i <= 7; 0 <= j <= 7 | |
| 27. |
Larger networks would prefer a full decentralization. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» C. May be | |
| 28. |
Which of the following is required to find the session key?i) Control Vectorii) Master Keyiii) Encrypted session Key |
| A. | i) |
| B. | i) and ii) |
| C. | i) and iii) |
| D. | i) ii) and iii) |
| Answer» E. | |
| 29. |
Which system uses a trusted third party interface? |
| A. | Public-Key Certificates |
| B. | Public announcements |
| C. | Publicly available directories |
| D. | Public-Key authority |
| Answer» B. Public announcements | |
| 30. |
Hashing followed by encryption (H→E) is used by which algorithm? |
| A. | IPSec |
| B. | SSH |
| C. | WEP |
| D. | SSL/TLS |
| Answer» D. SSL/TLS | |
| 31. |
Each round uses a different key in the algorithm. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 32. |
The 8 × 8 hash matrix holds values of size |
| A. | 16 bits |
| B. | 32 bits |
| C. | 8 bits |
| D. | 4 bits |
| Answer» D. 4 bits | |
| 33. |
MAC is a |
| A. | one-to-one mapping |
| B. | many-to-one mapping |
| C. | onto mapping |
| D. | none of the mentioned |
| Answer» C. onto mapping | |
| 34. |
Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, this chain is represented in the correct order as – |
| A. | X2 X1 X1 B |
| B. | X1 X1 X2 A |
| C. | X1 X2 X2 B |
| D. | X1 X2 X2 A |
| Answer» D. X1 X2 X2 A | |
| 35. |
Mix Row functions operate on the 8 × 8 matrix (A) to form the new matrix. The operation can be considered to be B = AC. The matrix C is formed by |
| A. | each successive even row having left shifts |
| B. | each successive row having a left shifts |
| C. | each successive odd row having right shifts |
| D. | each successive row having a right shifts |
| Answer» E. | |
| 36. |
Which one of these is not a Whirlpool function? |
| A. | Add Key |
| B. | Substitute Bytes |
| C. | Mix Rows |
| D. | Shift Rows |
| Answer» E. | |
| 37. |
Which of these is not a type of session key? |
| A. | PIN-encrypting key |
| B. | File-encrypting key |
| C. | Session encrypting key |
| D. | Data encrypting key |
| Answer» D. Data encrypting key | |
| 38. |
Which systems use a timestamp?i) Public-Key Certificatesii) Public announcementsiii) Publicly available directoriesiv) Public-Key authority |
| A. | i) and ii) |
| B. | iii) and iv) |
| C. | i) and iv) |
| D. | iv) only |
| Answer» D. iv) only | |
| 39. |
CMS stands for |
| A. | cipher message syntax |
| B. | certificate message session |
| C. | cryptographic message syntax |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 40. |
How many handshake rounds are required in the Public-Key Distribution Scenario? |
| A. | 7 |
| B. | 5 |
| C. | 3 |
| D. | 4 |
| Answer» B. 5 | |
| 41. |
CMP stands for |
| A. | cipher message protocol |
| B. | cipher management protocol |
| C. | certificate message protocol |
| D. | none of the mentioned |
| Answer» E. | |
| 42. |
How many functions are involved in the PKIX architectural model? |
| A. | 3 |
| B. | 5 |
| C. | 6 |
| D. | 7 |
| Answer» E. | |
| 43. |
The issuer unique identifier of the X.509 certificates was added in which version? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» C. 3 | |
| 44. |
A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other’s public key for future – a technique known as ____ |
| A. | time stamping |
| B. | polling |
| C. | caching |
| D. | squeezing |
| Answer» D. squeezing | |
| 45. |
For an n-bit tag and a k-bit key, the level of effort required for brute force attack on a MAC algorithm is |
| A. | 2^k |
| B. | 2^n |
| C. | min(2^k,2^n) |
| D. | 2^k/2^n |
| Answer» D. 2^k/2^n | |
| 46. |
X.509 certificate recommends which cryptographic algorithm? |
| A. | RSA |
| B. | DES |
| C. | AES |
| D. | Rabin |
| Answer» B. DES | |
| 47. |
The period of validity consists of the date on which the certificate expires. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» C. May be | |
| 48. |
What is the value of opad in the HMAC structure? |
| A. | 00111110 |
| B. | 00110010 |
| C. | 10110110 |
| D. | 01011100 |
| Answer» E. | |
| 49. |
“Conveys any desired X.500 directory attribute values for the subject of this certificate.”Which Extension among the following does this refer to? |
| A. | Subject alternative name |
| B. | Issuer Alternative name |
| C. | Subject directory attributes |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 50. |
Which round provides linear diffusion in the Whirlpool Algorithm? |
| A. | Add Key |
| B. | Substitute Bytes |
| C. | Mix Rows |
| D. | Shift Rows |
| Answer» D. Shift Rows | |