Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Which figure implements confidentiality, authentication and signature?

A. a
B. b
C. c
D. d
Answer» E.
2.

What does the below figure represent?

A. Hierarchical in X.509
B. IPsec connectivity
C. TCP nodes and links
D. None of the mentioned
Answer» B. IPsec connectivity
3.

The following figure has authentication tied to the plain text-

A. True
B. False
C. May be
D. Can't say
Answer» C. May be
4.

The below figure implements authentication and signature only?

A. True
B. False
C. May be
D. Can't say
Answer» B. False
5.

The below figure represents internal error control.

A. True
B. False
C. May be
D. Can't say
Answer» C. May be
6.

Which figure implements confidentiality and authentication?

A. a
B. b
C. c
D. d
Answer» B. b
7.

Another name for Message authentication codes is

A. cryptographic codebreak
B. cryptographic codesum
C. cryptographic checksum
D. cryptographic checkbreak
Answer» D. cryptographic checkbreak
8.

For a 150-bit message and a 10-bit MAC, how many values are the MAC value dependent on?

A. 2^140
B. 2^150
C. 2^15
D. 2^10
Answer» B. 2^150
9.

Confidentiality can only be provided if we perform message encryption before the MAC generation.$

A. True
B. False
Answer» C.
10.

For_a_150-bit_message_and_a_10-bit_MAC,_how_many_values_are_the_MAC_value_dependent_on?$

A. 2<sup>140</sup>
B. 2<sup>150</sup>
C. 2<sup>15</sup>
D. 2<sup>10</sup>
Answer» B. 2<sup>150</sup>
11.

MACs_are_also_called

A. testword
B. checkword
C. testbits
D. none of the mentioned
Answer» D. none of the mentioned
12.

Another name for Message authentication codes i?

A. cryptographic codebreak
B. cryptographic codesum
C. cryptographic checksum
D. cryptographic checkbreak
Answer» C. cryptographic checksum