Network Security - Quiz 3 BITS WILP - Mtec Software Systems - 2017

Network Security - Quiz 3
BITS WILP - Mtec Software Systems - 2017 


1. Hash function should be Collision resistance
Select one:
True
False

Ans: True

2. Security of SHA-1 is 160 bits
Select one:
True
False

Ans: True

3. Symmetric key provide non-repudiation.
Select one:
True
False

Ans: False

4. SHA-1 has 80 Rounds
Select one:
True
False

Ans: True

5. Electronic Code Book mode is susceptible to substitution attacks:
Select one:
True
False

Ans: True

6. Secret prefix MAC: m = MACk(x) = h(k||x).
Select one:
True
False

Ans: True

7. Effective key length of 3DES is 112 bits
Select one:
True
False

Ans: True

8. SHA-1 is based on Merkel-Damgard construction
Select one:
True
False

Ans: True

9. Key whitening makes the block ciphers such as DES/AES much more resistant against
brute-force attacks.
Select one:
True
False

Ans: True

10. SHA-1 is key-less hash algorithm
Select one:
True
False

Ans: True

11. Hash function should be one way function
Select one:
True
False

Ans: True

12. Collision Resistance: Given x1 and h(x1), it should be computationally infeasible to find any
x2 such that h(x1) = h(x2).
where h(x1) is hash(x1)
Select one:
True
False

Ans: False

13. Using the meet-in-the-middle attack, the key space is drastically reduced.
Select one:
True
False

Ans: True

14. SHA-1 has 5 stages
Select one:
True
False

Ans: False

15. Secret suffix MAC: m = MACk(x) = h(x||k).
Select one:
True
False

Ans: True

No comments:

Post a Comment