Search Header Logo

SECURE COMMUNICATION MODULE 5

Authored by NITHYA M.

Computers

University

SECURE COMMUNICATION MODULE 5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

1. Which figure implements confidentiality and authentication?

Media Image
Media Image
Media Image
Media Image

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Another name for Message authentication codes is

cryptographic codebreak

cryptographic codesum

cryptographic checksum

cryptographic checkbreak

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For a 150-bit message and a 10-bit MAC, how many values are the MAC value dependent on?

2140

2150

215

210

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MAC is a

one-to-one mapping

many-to-one mapping

onto mapping

none of the mentioned

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Confidentiality can only be provided if we perform message encryption before the MAC generation.

true

false

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the meaning of crypt

hidden writing

secret writing

copy

none of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following are the applications of cryptography?

digital signature

authentication

key generation

all of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers