MCQOPTIONS
Saved Bookmarks
This section includes 16 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
We can trade security for speed by |
| A. | decreasing ‘c’ and increasing ‘r’ |
| B. | increasing ‘c’ and decreasing ‘r’ |
| C. | decreasing both ‘c’ and ‘r’ |
| D. | increasing both ‘c’ and ‘r’ |
| Answer» C. decreasing both ‘c’ and ‘r’ | |
| 2. |
The larger the value of ‘r’, the lesser the rate at which message bits are processed by the sponge construction. |
| A. | True |
| B. | False |
| Answer» C. | |
| 3. |
In the sponge construction, the value ‘c’ is known as |
| A. | constant |
| B. | capacity |
| C. | construct |
| D. | closure |
| Answer» C. construct | |
| 4. |
In SHA-3, if the desired output is l bits, then j blocks are produced, such that |
| A. | (j-1) x r < l <= (j) x r |
| B. | (j) x r< l <= (j+1) x r |
| C. | (j-1) x r < l <= (j+1) x r |
| D. | (j+1) x r < l <= (j+2) x r |
| Answer» B. (j) x r< l <= (j+1) x r | |
| 5. |
The registers ‘a’ and ‘e’ involve |
| A. | Permutation and substitution both |
| B. | Only Permutation |
| C. | Only substitution |
| D. | Don’t undergo any operations |
| Answer» D. Don’t undergo any operations | |
| 6. |
IN_THE_SPONGE_CONSTRUCTION,_THE_VALUE_‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚Àւ§C‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚ÀÖ¬•_IS_KNOWN_AS?$# |
| A. | constant |
| B. | capacity |
| C. | construct |
| D. | closure |
| Answer» C. construct | |
| 7. |
We can trade security for speed by$ |
| A. | decreasing ‘c’ and increasing ‘r’ |
| B. | increasing ‘c’ and decreasing ‘r’ |
| C. | decreasing both ‘c’ and ‘r’ |
| D. | increasing both ‘c’ and ‘r’ |
| Answer» C. decreasing both ‚Äö√Ñ√∂‚àö√ë‚àö‚â§c‚Äö√Ñ√∂‚àö√ë‚àö¬• and ‚Äö√Ñ√∂‚àö√ë‚àö‚â§r‚Äö√Ñ√∂‚àö√ë‚àö¬• | |
| 8. |
The larger the value of ‘r’, the lesser the rate at which message bits are processed by the sponge construction.$# |
| A. | True |
| B. | False |
| Answer» C. | |
| 9. |
The default values for Keccak f are |
| A. | c =1024 and r =576 |
| B. | c =786 and r =832 |
| C. | c =512 and r =1088 |
| D. | c =512 and r =832 |
| Answer» D. c =512 and r =832 | |
| 10. |
In SHA-3, if the desired output is l bits, then j blocks are produced, such tha? |
| A. | (j-1) x r < l <= (j) x r |
| B. | (j) x r< l <= (j+1) x r |
| C. | (j-1) x r < l <= (j+1) x r |
| D. | (j+1) x r < l <= (j+2) x r |
| Answer» B. (j) x r< l <= (j+1) x r | |
| 11. |
Multi-rate padding is denoted by |
| A. | 10* |
| B. | 10*1 |
| C. | 10*1* |
| D. | 0*1 |
| Answer» C. 10*1* | |
| 12. |
SHA-3 allows variable length input and output. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 13. |
The underlying structure of the SHA-3 algorithm is referred to as |
| A. | Texture construction |
| B. | Layer construction |
| C. | Sponge construction |
| D. | Cement construction |
| Answer» D. Cement construction | |
| 14. |
What is the number of operation required to come up with 2 messages having the same message digest in SHA-512? |
| A. | 2<sup>256</sup> |
| B. | 2<sup>512</sup> |
| C. | 2<sup>1024</sup> |
| D. | 2<sup>128</sup> |
| Answer» B. 2<sup>512</sup> | |
| 15. |
In SHA-512, W16 is dependent on |
| A. | W0,W3,W7,W13 |
| B. | W3,W7,W11,W15 |
| C. | W0,W1,W9,W14 |
| D. | W0,W1,W10,W13 |
| Answer» D. W0,W1,W10,W13 | |
| 16. |
The registers ‘a’ and ‘e’ involve |
| A. | Permutation and substitution both |
| B. | Only Permutation |
| C. | Only substitution |
| D. | Don’t undergo any operations |
| Answer» D. Don‚Äö√Ñ√∂‚àö√ë‚àö¬•t undergo any operations | |