

MCQOPTIONS
Saved Bookmarks
This section includes 62 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
51. |
Which figure implements confidentiality, authentication and signature? |
A. | a |
B. | b |
C. | c |
D. | d |
Answer» E. | |
52. |
What does the below figure represent? |
A. | Hierarchical in X.509 |
B. | IPsec connectivity |
C. | TCP nodes and links |
D. | None of the mentioned |
Answer» B. IPsec connectivity | |
53. |
The following figure has authentication tied to the plain text- |
A. | True |
B. | False |
C. | May be |
D. | Can't say |
Answer» C. May be | |
54. |
The below figure implements authentication and signature only? |
A. | True |
B. | False |
C. | May be |
D. | Can't say |
Answer» B. False | |
55. |
The below figure represents internal error control. |
A. | True |
B. | False |
C. | May be |
D. | Can't say |
Answer» C. May be | |
56. |
Which figure implements confidentiality and authentication? |
A. | a |
B. | b |
C. | c |
D. | d |
Answer» B. b | |
57. |
Another name for Message authentication codes is |
A. | cryptographic codebreak |
B. | cryptographic codesum |
C. | cryptographic checksum |
D. | cryptographic checkbreak |
Answer» D. cryptographic checkbreak | |
58. |
For a 150-bit message and a 10-bit MAC, how many values are the MAC value dependent on? |
A. | 2^140 |
B. | 2^150 |
C. | 2^15 |
D. | 2^10 |
Answer» B. 2^150 | |
59. |
Confidentiality can only be provided if we perform message encryption before the MAC generation.$ |
A. | True |
B. | False |
Answer» C. | |
60. |
For_a_150-bit_message_and_a_10-bit_MAC,_how_many_values_are_the_MAC_value_dependent_on?$ |
A. | 2<sup>140</sup> |
B. | 2<sup>150</sup> |
C. | 2<sup>15</sup> |
D. | 2<sup>10</sup> |
Answer» B. 2<sup>150</sup> | |
61. |
MACs_are_also_called |
A. | testword |
B. | checkword |
C. | testbits |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
62. |
Another name for Message authentication codes i? |
A. | cryptographic codebreak |
B. | cryptographic codesum |
C. | cryptographic checksum |
D. | cryptographic checkbreak |
Answer» C. cryptographic checksum | |