MCQOPTIONS
Saved Bookmarks
This section includes 8 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Security Cryptography knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which two of the following are authentication algorithms? |
| A. | MAC |
| B. | AES |
| C. | DAS |
| D. | Digital-signature |
| Answer» B. AES | |
| 2. |
SHA-1 produces __________ bit of hash. |
| A. | 128 |
| B. | 160 |
| C. | 150 |
| D. | 112 |
| Answer» C. 150 | |
| 3. |
MD5 produces __________ bits hash data. |
| A. | 128 |
| B. | 150 |
| C. | 160 |
| D. | 112 |
| Answer» B. 150 | |
| 4. |
Which of the following is not a stream cipher? |
| A. | Two fish |
| B. | RC5 |
| C. | RC4 |
| D. | TBONE |
| Answer» E. | |
| 5. |
What is not an encryption standard? |
| A. | AES |
| B. | TES |
| C. | Triple DES |
| D. | DES |
| Answer» C. Triple DES | |
| 6. |
What is cipher-block chaining? |
| A. | Data is logically ANDed with previous block |
| B. | Data is logically ORed with previous block |
| C. | Data is logically XORed with previous block |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 7. |
What is not a role of encryption? |
| A. | It is used to protect data from unauthorized access during transmission |
| B. | It is used to ensure user authentication |
| C. | It is used to ensure data integrity |
| D. | It is used to ensure data corruption doesn t happens |
| Answer» E. | |
| 8. |
What is the preferred way of encryption? |
| A. | pre shared secret key |
| B. | using key distribution center (KDC) |
| C. | public key-encryption |
| D. | symmetric key |
| Answer» D. symmetric key | |