Authentication and Cryptography Quiz

Authentication and Cryptography Quiz

University

20 Qs

quiz-placeholder

Similar activities

DBMS

DBMS

University

20 Qs

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM)

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (GSM)

University

15 Qs

Code Blitz 40

Code Blitz 40

University

15 Qs

GSM and Mobile Communication Quiz

GSM and Mobile Communication Quiz

University

20 Qs

Understanding the OSI Model

Understanding the OSI Model

University

20 Qs

Midterm Examination in Web Programming

Midterm Examination in Web Programming

University

16 Qs

2.1 - Sketching

2.1 - Sketching

10th Grade - University

25 Qs

DBMS

DBMS

University

20 Qs

Authentication and Cryptography Quiz

Authentication and Cryptography Quiz

Assessment

Quiz

Engineering

University

Hard

Created by

Yuvarani Technology

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following ensures data integrity in message authentication?

Encryption

MAC

Key exchange

Random numbers

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main purpose of a hash function in authentication?

Encrypt the message

Provide a fixed-length output from input data

Generate random keys

Compress large data into smaller packets

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of these is NOT a property of a secure hash function?

Pre-image resistance

Collision resistance

Key-dependent output

Avalanche effect

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

HMAC provides message authentication by combining a cryptographic hash function with:

A public key

A symmetric key

An initialization vector

A random number

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which hash function is the basis for HMAC and widely used in authentication?

SHA

MD5

CRC

DES

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the primary purpose of a digital signature?

Ensure message confidentiality

Verify the sender's identity and data integrity

Encrypt the message

Distribute symmetric keys

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which digital signature algorithm is used in the Digital Signature Standard (DSS)?

RSA

DSA

ECC

AES

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?