Explore topic-wise MCQs in Cryptography and Network Security.

This section includes 62 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.

51.

Which figure implements confidentiality, authentication and signature?

A. a
B. b
C. c
D. d
Answer» E.
52.

What does the below figure represent?

A. Hierarchical in X.509
B. IPsec connectivity
C. TCP nodes and links
D. None of the mentioned
Answer» B. IPsec connectivity
53.

The following figure has authentication tied to the plain text-

A. True
B. False
C. May be
D. Can't say
Answer» C. May be
54.

The below figure implements authentication and signature only?

A. True
B. False
C. May be
D. Can't say
Answer» B. False
55.

The below figure represents internal error control.

A. True
B. False
C. May be
D. Can't say
Answer» C. May be
56.

Which figure implements confidentiality and authentication?

A. a
B. b
C. c
D. d
Answer» B. b
57.

Another name for Message authentication codes is

A. cryptographic codebreak
B. cryptographic codesum
C. cryptographic checksum
D. cryptographic checkbreak
Answer» D. cryptographic checkbreak
58.

For a 150-bit message and a 10-bit MAC, how many values are the MAC value dependent on?

A. 2^140
B. 2^150
C. 2^15
D. 2^10
Answer» B. 2^150
59.

Confidentiality can only be provided if we perform message encryption before the MAC generation.$

A. True
B. False
Answer» C.
60.

For_a_150-bit_message_and_a_10-bit_MAC,_how_many_values_are_the_MAC_value_dependent_on?$

A. 2<sup>140</sup>
B. 2<sup>150</sup>
C. 2<sup>15</sup>
D. 2<sup>10</sup>
Answer» B. 2<sup>150</sup>
61.

MACs_are_also_called

A. testword
B. checkword
C. testbits
D. none of the mentioned
Answer» D. none of the mentioned
62.

Another name for Message authentication codes i?

A. cryptographic codebreak
B. cryptographic codesum
C. cryptographic checksum
D. cryptographic checkbreak
Answer» C. cryptographic checksum