Here, we have a set of multiple-choice questions and answers (quiz) on hash functions in Cryptography (basic concepts of Cryptography Hash Functions).

### questions

Title
###### Which of the following is /are offered by the Hash functions?

Which of the following is /are offered by the Hash functions?

1. Authentication
2. Non repudiation
3. Data Integrity
4. All of the above
###### Which of the following is not a property of Hash Function?

Which of the following is not a property of Hash Function?

1. Pre-Image Resistance
2. Compression
3. Fixed Length Output
4. None of the above
###### Which of the following security services cannot be achieved using the Hash functions? OR Which of the following is not possible through hash value?

Which of the following security services cannot be achieved using the Hash functions?
OR
Which of the following is not possible through hash value?

1. Password Check
2. Data Integrity check
3. Digital Signatures
4. Data retrieval in its original form
###### Which of the following options is not correct according to the definition of the Hash Function?

Which of the following options is not correct according to the definition of the Hash Function?

1. Hash Functions are mathematical functions
2. They compress the input values
3. The hash functions work on arbitrary length input but produces fixed length output
4. None of the above
###### "The Hash Function takes an input of arbitrary length and converts it into a fixed length output." Which of the following names can we use for denoting the output of the hash function?

"The Hash Function takes an input of arbitrary length and converts it into a fixed length output."

Which of the following names can we use for denoting the output of the hash function?

1. Hash value
2. Hash Code
3. Message Digest
4. All of the above
###### A cryptographic hash function is an equation used to verify the ____ of data

A cryptographic hash function is an equation used to verify the ____ of data.

1. Variety
2. Validity
3. Veracity
4. None of the mentioned above
###### Hash functions are mathematical functions that transform or "map" a given set of data into a bit string of fixed size, also known as the hash value

Hash functions are mathematical functions that transform or "map" a given set of data into a bit string of fixed size, also known as the hash value.

1. Hash value
2. Map value
3. Both A and B
4. None of the mentioned above
###### Hash functions are used in ___ and have variable levels of complexity and difficulty

Hash functions are used in ___ and have variable levels of complexity and difficulty.

1. System approach
2. Cyber safe
3. Cryptography
4. None of the mentioned above
###### Hashes can be used to make sure messages and files transmitted from sender to receiver are not tampered with during transit

Hashes can be used to make sure messages and files transmitted from sender to receiver are not tampered with during transit.

1. True
2. False
###### Cryptographic hashing provides a barrier to potential _______

Cryptographic hashing provides a barrier to potential _______.

1. Attackers
2. Sender
3. Receiver
4. None of the mentioned above

MCQs

Views

Best Answers

Points