Home » Cryptography » Cryptography MCQs

# MCQ | Cryptography Hash Functions (Level: Easy)

Here, we have a **set of multiple-choice questions and answers (quiz) on hash functions in Cryptography** (basic concepts of Cryptography Hash Functions).

Submitted by Monika Sharma, on February 10, 2020

**1) Which of the following is /are offered by the Hash functions?**

- Authentication
- Non repudiation
- Data Integrity
- All of the above

**Answer:** d. All of the above

**Explanation:**

The Hash functions offer all the mentioned properties in a data compression: i.e. authentication, Non repudiation and Data Integrity.

**2) Which of the following is not a property of Hash Function?**

- Pre-Image Resistance
- Compression
- Fixed Length Output
- None of the above

**Answer:** d. None of the above

**Explanation:**

All the first three options are the properties of the Hash function. None of the mentioned characteristic fall apart form them. Therefore, the correct answer is none of the above.

**3) Which of the following security services cannot be achieved using the Hash functions?ORWhich of the following is not possible through hash value? **

- Password Check
- Data Integrity check
- Digital Signatures
- Data retrieval in its original form

**Answer:** d. Data retrieval in its original form

**Explanation:**

As the hash functions are irreversible and has pre-image resistance property, therefore it is almost impossible to obtain the original data form its hash value. Therefore, it is not possible to retrieve data in its original form from its hash value.

**4) Which of the following options is not correct according to the definition of the Hash Function?**

- Hash Functions are mathematical functions
- They compress the input values
- The hash functions work on arbitrary length input but produces fixed length output.
- None of the above

**Answer:** d. None of the above

**Explanation:**

All the first three options obey to the definition of the Hash function. None of the mentioned options fall apart form it. Therefore, the correct answer is none of the above.

**5) "The Hash Function takes an input of arbitrary length and converts it into a fixed length output."Which of the following names can we use for denoting the output of the hash function?**

- Hash value
- Hash Code
- Message Digest
- All of the above

**Answer:** d. All of the above

**Explanation:**

All the mentioned names can be used to denote the output of a hash function. Therefore, the correct answer is d. All of the above.

**6) A cryptographic hash function is an equation used to verify the ____ of data.**

- Variety
- Validity
- Veracity
- None of the mentioned above

**Answer:** b. Validity

**Explanation:**

A cryptographic hash function verifies the validity of data. It has several uses, including information security (e.g., user authentication).

**7) Hash functions are mathematical functions that transform or "map" a given set of data into a bit string of fixed size, also known as the hash value.**

- Hash value
- Map value
- Both A and B
- None of the mentioned above

**Answer:** a. Hash value

**Explanation:**

Hash functions are mathematical functions that transform or "map" a given collection of data into a bit string of defined length, which is referred to as the hash value. Hash functions are used in cryptography. A hash value is the result of converting plaintext or ciphertext to hash value. Any kind of data can be transformed into a particular text string using hashing, which is a cryptographic approach.

**8) Hash functions are used in ___ and have variable levels of complexity and difficulty.**

- System approach
- Cyber safe
- Cryptography
- None of the mentioned above

**Answer:** c. Cryptography

**Explanation:**

When it comes to cryptography, hash functions are used, and their levels of complexity and difficulty might vary. Hash functions are utilized in a variety of applications, including cryptocurrency, password security, and communication security. As data structures in computing systems, hash functions are frequently employed to perform tasks such as verifying the integrity of communications and authenticating information.

**9) Hashes can be used to make sure messages and files transmitted from sender to receiver are not tampered with during transit.**

- True
- False

**Answer:** a. True

**Explanation:**

Hashes can be used to ensure that communications and files transported from sender to receiver are not tampered with while in transit between the two parties. It is possible to secure data by hashing a readable text into an unreadable text containing secure data. Hashing is a technique that is efficient to use yet exceedingly complex to reverse.

**10) Cryptographic hashing provides a barrier to potential _______.**

- Attackers
- Sender
- Receiver
- None of the mentioned above

**Answer:** a. Attackers

**Explanation:**

Potential attackers are deterred from gaining access to sensitive information by cryptographic hashing. A hostile individual attempting to gain access to the database will be able to see the hashes in the database. The attacker, on the other hand, will be unable to reverse the hash value back to the original password.

**More...**

- MCQ | Cryptography Basics
- MCQ | Cryptography Ciphers (Level: Easy) | Set 1
- MCQ | Cryptography Ciphers (Level: Easy) | Set 2
- MCQ | Cryptography Techniques of Block Cipher
- MCQ | Block Cipher as IDEA, DES, AES, RSA in Cryptography
- MCQ | Quantum Cryptography
- MCQ | Hash Function Technique
- MCQ | Modes of Operations in Block Cipher

What's New

- Business Environment MCQs
- Sustainable Development MCQs
- Marginal Costing and Absorption Costing MCQs
- Globalisation MCQs
- Indian Economy MCQs
- Retained Earnings MCQs
- Depreciation MCQs
- Partnership MCQs
- Sole Proprietorship MCQs
- Goods and Services Tax (GST) MCQs
- Cooperative Society MCQs
- Capital Market MCQs
- Business Studies MCQs
- Basic Accounting MCQs
- MIS Executive Interview Questions
- Go Language Interview Questions

Top Interview Coding Problems/Challenges!

- Run-length encoding (find/print frequency of letters in a string)
- Sort an array of 0's, 1's and 2's in linear time complexity
- Checking Anagrams (check whether two string is anagrams or not)
- Relative sorting algorithm
- Finding subarray with given sum
- Find the level in a binary tree with given sum K
- Check whether a Binary Tree is BST (Binary Search Tree) or not
- 1[0]1 Pattern Count
- Capitalize first and last letter of each word in a line
- Print vertical sum of a binary tree
- Print Boundary Sum of a Binary Tree
- Reverse a single linked list
- Greedy Strategy to solve major algorithm problems
- Job sequencing problem
- Root to leaf Path Sum
- Exit Point in a Matrix
- Find length of loop in a linked list
- Toppers of Class
- Print All Nodes that don't have Sibling
- Transform to Sum Tree
- Shortest Source to Destination Path

Comments and Discussions!