MCQS WITH KEY ANSWERS
MCQS WITH KEY ANSWERS
MCQS WITH KEY ANSWERS
8. Hash function which takes an input (or 'message') and returns a fixed-size alphanumeric
string.The string is called the .
A) Message digest
B) Hash Value
C) Checksum
D) All of the mentioned
15. Symmetric encryption with only sender and receiver sharing the key can achieve
authentication.
A) TRUE
B) FALSE
18. Hash function produces a fixed-length output accepting variable length data.
A) TRUE
B) FALSE
19. SHA-512 algorithm takes as input a message with a maximum length of less than.
A) 2 ^ 128
B) 2 ^ 192
C) 2 ^112
D) 2 ^ 64
20. SHA-512 algorithm has _________rounds in its function.
A) 10
B) 16
C) 82
D) 80
21. Confidentiality can only be provided if we perform message encryption before the MAC
generation.
A) True
B) False
25. Name the hash function that is important not only in message authentication but in digital
signatures.
A) Secure hash function
B) DES
C) AES
D) All the mentioned
26. SHA-256,SHA-384 and SHA-512 are collectively called as
A) SHA-1
B) SHA-2
C) SHA-3
D) SHA-4
30. The subject unique identifier of the X.509 certificates was added in which version?
A. 1
B. 2
C. 3
D. 4
33. Certificates generated by X that are the certificates of other CAs are Reverse Certificates.
A. True
B. False
37. The criticality indicator indicates whether an extension can be safely ignored.
A. True
B. False
38. “Conveys any desired X.500 directory attribute values for the subject of this certificate.”
40. Which one of the following is not a public key distribution means?
A. Public-Key Certificates
B. Hashing Certificates
C. Publicly available directories
D. Public-Key authority
41. Which of the following public key distribution systems is most secure?
A. Public-Key Certificates
B. Public announcements
C. Publicly available directories
D. Public-Key authority
43. For each _______ the Kerberos Key Distribution Centre (KDC) maintains a database of the
realm’s principal and the principal’s associated “secret keys”.
A. key
B. realm
C. document
D. none of the mentioned
45. For a client-server authentication, the client requests from the KDC a ________ for access to
a specific asset.
A. ticket
B. local
C. token
D. user
46. To authenticate using Kerberos, you must add the Kerberos user principals to MongoDB to
the _________ database.
A. $internal
B. $external
C. $extern
D. None of the mentioned
47. To specify a different value for <service>, use ________ during the start-up of mongod.
A. servicepwd
B. serviceName
C. servicelogin
D. none of the mentioned
48. Linux systems can store Kerberos authentication keys for a service principal in ______ files.
A. Client
B. Server
C. key tab
D. All of the mentioned
49. A _________ is a trusted third party that assigns a symmetric key to two parties.
A. KDC
B. CA
C. KDD
D. None of the options
50. A________ creates a secret key only between a member and the centre.
A. CA
B. KDC
C. KDD
D. None of the options
51. The secret key between members need to be created as a _______ key when two members
contact KDC.
A. Public
B. Session
C. Complimentary
D. None of the options
52. ____________ is a popular session key creator protocol that requires an authentication
server and a ticket granting server.
A. KDC
B. Kerberos
C. CA
D. None of the options
53. A___________ is a federal or state organization that binds a publick key to an entity and
issues a certificate.
A. KDC
B. Kerberos
C. CA
D. None of the options
54. A___________ is a hierarchical system that answers queries about key certification.
A. KDC
B. Kerberos
C. CA
D. None of the options
55. The secret key between members needs to be created as a ______ key when two members
contact KDC.
A. public
B. session
C. complimentary
D. none of the options
56. In ______ there is a single path from the fully trusted authority to any certificate.
A. X509
B. PGP
C. KDC
D. none of the options
57. The denotation of certificate issuing, between Certificate issuing authority and applicant,
A. CA<<A>>
B. CA>>A
C. CA<A>
D. A<<CA>>
60. The property of hash function is said to be UNIFORM, if all the input bits influence the
output hash.
A) True
B) False
61. If a single bit of the input string is flipped then each bit of the hash value is flipped with a
probability roughly equal to ----
A) 0.2
B) 0.5
C) 1.0
D) 0.75
62. HASH function converts a plaintext of arbitrary size to a fixed size output.
A) True
B) False
65. HASH function converts a plaintext of arbitrary size to a fixed size output called as
A) Digest
B) Hash value
C) Hash
D) all of the mentioned
67. when a document is genuine and comes from an alleged source its said to be
A) Authentication
B) Integrity
C) Confidentiality
D) All of the mentioned
69. Which of the following accepts variable size message and generates an authenticator
without the use of the key
A) Ciphertext
B) Message Authentication Code
C) Hash Code
D) All of the mentioned
70. The property for any hash code 'h', and its computational infeasibility to find x such that
H(x)=h
A) One Way Hash Function
B) Weak collision Resistant
C) Strong Collision Resistant
D) All the mentioned
71. The property for any hash code 'h', and its computational infeasibility to find x such that y=x
with H(y)=H(x)
A) One Way Hash Function
B) Weak collision Resistant
C) Strong Collision Resistant
D) All the mentioned
72. The property for any hash code 'h', and its computational infeasibility to find a pair (x, y)
such that H(y)=H(x)
A) One Way Hash Function
B) Weak collision Resistant
C) Strong Collision Resistant
D) All the mentioned
74. SHA-512 processes input of size of __________bits with _________rounds and ___________
Buffers.
A) 1024 bits, 80 , 6
B) 512 bits, 80, 8
C) 1024 bits, 80, 8
D) 512 bits, 79, 6
75. Cryptographic hash functions execute faster in software than block ciphers.
A) Statement is correct
B) Statement is incorrect
C) Depends on the hash function
D) Depends on the processor
83. For a 150-bit message and a 10-bit MAC, how many values are the MAC value dependent
on?
A) 2140
B) 2150
C) 215
D) 210
84. Confidentiality can only be provided if we perform message encryption before the MAC
generation.
A) True
B) False
87. MAC is a
A) one-to-one mapping
B) many-to-one mapping
C) onto mapping
D) none of the mentioned
88. For an n-bit tag and a k-bit key, the level of effort required for brute force attack on a MAC
algorithm is
A) 2k
B) 2n
C) min(2k,2n)
D) 2k/2n
91. A ________ signature is included in the document; a _______ signature is a separate entity.
A) conventional; digital
B) digital; digital
C) either (a) or (b)
D) neither (a) nor (b)
94. The _______ criterion states that it must be extremely difficult or impossible to create the
message if the message digest is given.
A) one-wayness
B) weak-collision-resistance
C) strong-collision-resistance
D) none of the mentioned
95. The ________ criterion ensures that a message cannot easily be forged.
A) one-wayness
B) weak-collision-resistance
C) strong-collision-resistance
D) none of the mentioned
96. The _______criterion ensures that we cannot find two messages that hash to the same
digest.
A) one-wayness
B) weak-collision-resistance
C) strong-collision-resistance
D) none of the mentioned
97. What is the number of round computation steps in the SHA-256 algorithm?
A) 80
B) 76
C) 64
D) 70
98. In SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
A) 1024
B) 512
C) 256
D) 1248
101. When IPsec is implemented in a Firewall,it provides strong security that can be
applied to all crossing the perimeter of
A) Firewall
B) Etherenet Switch
C) Gateway
D) HUB
102. The principal feature of IPsec that enables it to support varied applications is
A) It can encrypt and/or authenticate all traffic at the application level
B) It can encrypt and/or authenticate all traffic at the IP level
C) Both A and B
D) Security at physical layer
104. In an IP security scenario,the data leaving the network device with IPSec will have
A) IP Header ,IPsec header ,Secure IP Payload
B) Only IP Header
C) Both A and B
D) None of the above
105. IPsec can be transparent to end users which means no need to train users on
security mechanisms
A) TRUE
B) FALSE
107. IPsec can play a vital role in the routing architecture which can assure
A) A router advertisement
B) A neighbor advertisement
C) Unforged routing update
D) All of the mentioned
109. __________ document of the IPsec document covers the general concepts, security
requirements, definitions,and mechanisms defining IPsec technology.
A) Architecture
B) Authentication Header
C) Encapsulating Security Payload
D) Internet Key Exchange
111. IPsec provides security services at the IP layer by enabling a system to select
A) required security protocols
B) determine the algorithm(s) to use for the service(s),
C) put in place any cryptographic keys required to provide the requested services
D) All of the mentioned
113. __________ and ______________ are the two protocols used in IPsec to provide
security.
A) Authentication Header and Internet Key Exchange
B) Authentication Header and Encapsulating Security Payload
C) Encapsulating Security Payload and Internet Key Exchange
D) RSA and Elliptic Curve
117. AH in transport mode authenticates the IP payload and selected portions of the IP
header.
A) TRUE
B) FALSE
119. ___________ mode is used when one or both ends of a security association (SA) are
a security gateway
A) Transport mode
B) Tunnel mode
C) Both A and B
D) None of the mentioned
120. With tunnel mode, of hosts on networks behind firewalls cannot engage in secure
communications without implementing IPsec
A) TRUE
B) FALSE
124. Typically which mode of IPSEC is used for end-to-end communication between two
hosts.
A) Transport Mode
B) Tunnel Mode
C) Both A and B
D) None of the mentioned
128. ______ provides either authentication or encryption, or both, for packets at the IP
level.
A) AH
B) ESP
C) PGP
D) SSL
130. Encapsulating Security Payload with authentication Encrypts entire inner IP packet
and Authenticates inner IP packet.
A) Transport Mode SA
B) Tunnel Mode SA
C) Both A and B
D) None of the mentioned
131. In the ______ mode, IPSec protects information delivered from the transport layer
to the network layer.
A) transport
B) tunnel
C) either (a) or (b)
D) neither (a) nor (b)
132. IPSec in the ______ mode does not protect the IP header.
A) transport
B) tunnel
C) either (a) or (b)
D) neither (a) nor (b)
139. In _______, the cryptographic algorithms and secrets are sent with the message.
A) IPSec
B) SSL
C) TLS
D) PGP
141. In PGP, to exchange e-mail messages, a user needs a ring of _______ keys.
A) secret
B) public
C) either Secret or Public
D) both Secret and Public
148. When sending digital signatures, PGP uses an efficient algorithm that generates
_________
A) CipherText
B) PlainText
C) MAC
D) HASH
160. PGP makes use of following algorithms as a package for Public key encryption
A) RSA, DSS adn Diffie-Hellman
B) Diffie-Hellman
C) RSA
D) DSS
161. PGP makes use of following algorithms as a package for Symmetric key encryption
A) CAST-128
B) IDEA
C) CAST-128, IDEA and 3DES
D) None of the mentioned
162. PGP makes use of following algorithm for generating HASH CODE
A) SHA-512
B) SHA-256
C) SHA-2
D) SHA-1
168. S/MIME provides the following functions i) Enveloped data ii) Signed data iii) Clear-
signed data iv) Signed and enveloped data
A) i) ,ii) and iii)
B) i) ,ii) iii) and iv)
C) None
D) Only i)
180. In MIME, jpeg and gif comes under which Content type
A) Image
B) Video
C) Audio
D) Multipart
C A B B B D A D D D
C C A C A D C A A D
B C A C A B A B C B
B C A D C D A C D B
A C B D A B B C A B
B B C C B C A D A A
B A B B D A A D D A
B C C C D B D B A D
A C A B D A B C C A
A C B A B C A A A D
A B D A A A D C A D
D A B C C D A D B B
B A D A A B A B A B
A A C B D C C C D C
B C C C C C A D A B
C D A C B C C A A A
C D B B C A C B A C
D B B A A A C C D A