Network Security - Quiz 3
BITS WILP - Mtec Software Systems - 2017
1. Hash function should be Collision resistance
Select one:
True
False
Ans: True
2. Security of SHA-1 is 160 bits
Select one:
True
False
Ans: True
3. Symmetric key provide non-repudiation.
Select one:
True
False
Ans: False
4. SHA-1 has 80 Rounds
Select one:
True
False
Ans: True
5. Electronic Code Book mode is susceptible to substitution attacks:
Select one:
True
False
Ans: True
6. Secret prefix MAC: m = MACk(x) = h(k||x).
Select one:
True
False
Ans: True
7. Effective key length of 3DES is 112 bits
Select one:
True
False
Ans: True
8. SHA-1 is based on Merkel-Damgard construction
Select one:
True
False
Ans: True
brute-force attacks.
Select one:
True
False
Ans: True
10. SHA-1 is key-less hash algorithm
Select one:
True
False
Ans: True
11. Hash function should be one way function
Select one:
True
False
Ans: True
12. Collision Resistance: Given x1 and h(x1), it should be computationally infeasible to find any
x2 such that h(x1) = h(x2).
where h(x1) is hash(x1)
Select one:
True
False
Ans: False
13. Using the meet-in-the-middle attack, the key space is drastically reduced.
Select one:
True
False
Ans: True
14. SHA-1 has 5 stages
Select one:
True
False
Ans: False
15. Secret suffix MAC: m = MACk(x) = h(x||k).
Select one:
True
False
Ans: True
No comments:
Post a Comment