Here, we have a set of multiple-choice questions and answers (quiz) on Hash Function Technique.

questions

Title
Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation

Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.


  1. 1024
  2. 512
  3. 256
  4. 1248
discuss
When a hash function is used to provide message authentication, the hash function value is called to as:

When a hash function is used to provide message authentication, the hash function value is called to as:


  1. Message Field
  2. Message Digest
  3. Message Score
  4. Message Leap
discuss
Which of the following are used to create a message digest by the network security protocols?

Which of the following are used to create a message digest by the network security protocols?


  1. RSA
  2. SHA-1
  3. DES
  4. MD5
  5. B. and C. and D.
discuss
What is the output of the N 1024-bit blocks from the Nth stage in this?

What is the output of the N 1024-bit blocks from the Nth stage in this?


  1. 512 bits
  2. 1024 bits
  3. N x 1024bits
  4. N x 512 bits
discuss
What is the output of a cryptographic hash function means?

What is the output of a cryptographic hash function means?


  1. A variable set of bits
  2. A fixed set of bits, derived from one-way mathematical operations
  3. An output which may be easily discovered by an adversary
  4. Outputs of such functions are of no importance
discuss
A hash function is a _____ that converts a numerical input value into another compressed numerical value

A hash function is a _____ that converts a numerical input value into another compressed numerical value.


  1. Abstract view
  2. Mathematical function
  3. Both A and B
  4. None of the mentioned above
discuss
A cryptographic hash function must be deterministic,

A cryptographic hash function must be deterministic,


  1. True
  2. False
discuss
_____ and encryption is two separate cryptographic processes

_____ and encryption is two separate cryptographic processes.


  1. Hashing
  2. Decryption
  3. Processing
  4. None of the mentioned above
discuss
Amongst which of the following is /are good for Hashes,

Amongst which of the following is /are good for Hashes,


  1. Password protection
  2. Data integrity / file verification
  3. Digital signatures and virus signatures
  4. All of the mentioned above
discuss
Digital Signatures authenticates the sender by appending the original message with the ____ digest

Digital Signatures authenticates the sender by appending the original message with the ____ digest.


  1. Decrypted message
  2. Encrypted message
  3. Systematic approach
  4. None of the mentioned above
discuss
total MCQs: 10

MCQs

10

Views

95

Best Answers

299

Points

5