×

Cryptography Tutorial

Cryptography MCQs

MCQ | Cryptography Hash Functions (Level: Easy)

Here, we have a set of multiple-choice questions and answers (quiz) on hash functions in Cryptography (basic concepts of Cryptography Hash Functions).
Submitted by Monika Sharma, on February 10, 2020

Cryptography Hash Functions MCQs

1) Which of the following is /are offered by the Hash functions?

  1. Authentication
  2. Non repudiation
  3. Data Integrity
  4. All of the above

Answer: d. All of the above

Explanation:

The Hash functions offer all the mentioned properties in a data compression: i.e. authentication, Non repudiation and Data Integrity.

2) Which of the following is not a property of Hash Function?

  1. Pre-Image Resistance
  2. Compression
  3. Fixed Length Output
  4. None of the above

Answer: d. None of the above

Explanation:

All the first three options are the properties of the Hash function. None of the mentioned characteristic fall apart form them. Therefore, the correct answer is none of the above.


3) Which of the following security services cannot be achieved using the Hash functions?
OR
Which of the following is not possible through hash value?

  1. Password Check
  2. Data Integrity check
  3. Digital Signatures
  4. Data retrieval in its original form

Answer: d. Data retrieval in its original form

Explanation:

As the hash functions are irreversible and has pre-image resistance property, therefore it is almost impossible to obtain the original data form its hash value. Therefore, it is not possible to retrieve data in its original form from its hash value.


4) Which of the following options is not correct according to the definition of the Hash Function?

  1. Hash Functions are mathematical functions
  2. They compress the input values
  3. The hash functions work on arbitrary length input but produces fixed length output.
  4. None of the above

Answer: d. None of the above

Explanation:

All the first three options obey to the definition of the Hash function. None of the mentioned options fall apart form it. Therefore, the correct answer is none of the above.


5) "The Hash Function takes an input of arbitrary length and converts it into a fixed length output."
Which of the following names can we use for denoting the output of the hash function?

  1. Hash value
  2. Hash Code
  3. Message Digest
  4. All of the above

Answer: d. All of the above

Explanation:

All the mentioned names can be used to denote the output of a hash function. Therefore, the correct answer is d. All of the above.


6) A cryptographic hash function is an equation used to verify the ____ of data.

  1. Variety
  2. Validity
  3. Veracity
  4. None of the mentioned above

Answer: b. Validity

Explanation:

A cryptographic hash function verifies the validity of data. It has several uses, including information security (e.g., user authentication).


7) Hash functions are mathematical functions that transform or "map" a given set of data into a bit string of fixed size, also known as the hash value.

  1. Hash value
  2. Map value
  3. Both A and B
  4. None of the mentioned above

Answer: a. Hash value

Explanation:

Hash functions are mathematical functions that transform or "map" a given collection of data into a bit string of defined length, which is referred to as the hash value. Hash functions are used in cryptography. A hash value is the result of converting plaintext or ciphertext to hash value. Any kind of data can be transformed into a particular text string using hashing, which is a cryptographic approach.


8) Hash functions are used in ___ and have variable levels of complexity and difficulty.

  1. System approach
  2. Cyber safe
  3. Cryptography
  4. None of the mentioned above

Answer: c. Cryptography

Explanation:

When it comes to cryptography, hash functions are used, and their levels of complexity and difficulty might vary. Hash functions are utilized in a variety of applications, including cryptocurrency, password security, and communication security. As data structures in computing systems, hash functions are frequently employed to perform tasks such as verifying the integrity of communications and authenticating information.


9) Hashes can be used to make sure messages and files transmitted from sender to receiver are not tampered with during transit.

  1. True
  2. False

Answer: a. True

Explanation:

Hashes can be used to ensure that communications and files transported from sender to receiver are not tampered with while in transit between the two parties. It is possible to secure data by hashing a readable text into an unreadable text containing secure data. Hashing is a technique that is efficient to use yet exceedingly complex to reverse.


10) Cryptographic hashing provides a barrier to potential _______.

  1. Attackers
  2. Sender
  3. Receiver
  4. None of the mentioned above

Answer: a. Attackers

Explanation:

Potential attackers are deterred from gaining access to sensitive information by cryptographic hashing. A hostile individual attempting to gain access to the database will be able to see the hashes in the database. The attacker, on the other hand, will be unable to reverse the hash value back to the original password.


More...



Comments and Discussions!

Load comments ↻





Copyright © 2024 www.includehelp.com. All rights reserved.