MCQOPTIONS
Saved Bookmarks
This section includes 62 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Which figure implements confidentiality, authentication and signature? |
| A. | a |
| B. | b |
| C. | c |
| D. | d |
| Answer» E. | |
| 52. |
What does the below figure represent? |
| A. | Hierarchical in X.509 |
| B. | IPsec connectivity |
| C. | TCP nodes and links |
| D. | None of the mentioned |
| Answer» B. IPsec connectivity | |
| 53. |
The following figure has authentication tied to the plain text- |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» C. May be | |
| 54. |
The below figure implements authentication and signature only? |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 55. |
The below figure represents internal error control. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» C. May be | |
| 56. |
Which figure implements confidentiality and authentication? |
| A. | a |
| B. | b |
| C. | c |
| D. | d |
| Answer» B. b | |
| 57. |
Another name for Message authentication codes is |
| A. | cryptographic codebreak |
| B. | cryptographic codesum |
| C. | cryptographic checksum |
| D. | cryptographic checkbreak |
| Answer» D. cryptographic checkbreak | |
| 58. |
For a 150-bit message and a 10-bit MAC, how many values are the MAC value dependent on? |
| A. | 2^140 |
| B. | 2^150 |
| C. | 2^15 |
| D. | 2^10 |
| Answer» B. 2^150 | |
| 59. |
Confidentiality can only be provided if we perform message encryption before the MAC generation.$ |
| A. | True |
| B. | False |
| Answer» C. | |
| 60. |
For_a_150-bit_message_and_a_10-bit_MAC,_how_many_values_are_the_MAC_value_dependent_on?$ |
| A. | 2<sup>140</sup> |
| B. | 2<sup>150</sup> |
| C. | 2<sup>15</sup> |
| D. | 2<sup>10</sup> |
| Answer» B. 2<sup>150</sup> | |
| 61. |
MACs_are_also_called |
| A. | testword |
| B. | checkword |
| C. | testbits |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 62. |
Another name for Message authentication codes i? |
| A. | cryptographic codebreak |
| B. | cryptographic codesum |
| C. | cryptographic checksum |
| D. | cryptographic checkbreak |
| Answer» C. cryptographic checksum | |