
IAS QUIZ 12
Authored by Darwin Vargas
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Message authentication is a mechanism or service used to verify the integrity of a message.
T
F
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The order in which the frame check sequence and encryption functions are performed is not critical for authentication.
F
T
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A recipient in possession of the secret key cannot generate an authentication code to verify the integrity of the message.
F
T
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
One means of forming a MAC is to combine a cryptographic hash function in some fashion with a secret key.
T
F
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A brute-force attack on a MAC is easier than a brute-force attack on a hash function.
F
T
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Message authentication may also verify sequencing and timeliness.
T
F
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function.
T
F
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?