This set of MCQ(multiple choice questions) focuses on the Ethical Hacking Week 7 Solutions.
Course layout
Answers COMING SOON! Kindly Wait!
Week 1:Â Assignment answers
Week 2: Assignment answers
Week 3: Assignment answers
Week 4: Assignment answers
Week 5: Assignment answers
Week 6: Assignment answers
Week 7: Assignment answers
Week 8: Assignment answers
Week 9: Assignment answers
Week 10: Assignment answers
Week 11: Assignment answers
Week 12: Assignment answers
NOTE: You can check your answer immediately by clicking show answer button. This set of “Ethical Hacking Week 7 Solutions” contains 10 questions.
Now, start attempting the quiz.
Ethical Hacking week 7 Solutions
Q1. Which of the following is/are true for Unkeyed hash function (Modification Detection Code)?
a) Unkeyed has function is used to preserve integrity of message.
b) Unkeyed hash function is used to authenticate source of message.
c) Unkeyed hash function produces an output that depends only on the input data.
d) None of these.
Answer: a)
Q2. Two messages M1 and M2 are fed to a hash function HASH to generate the hash values:
H1 = HASH (M1)
H2 = HASH (M2)
When do we say there is a collision?
a) H1 = H2
b) M1 = M2
c) H1 = HASH (H2)
d) None of these
Answer: a) H1 = H2
Q3. Which of the following corresponds to second preimage resistance in the context of hash functions?
a) Except of few hash values H, it should be difficult to find a message M1 such that HASH(M1) = H.
b) Given a message M1, it should be difficult to find another message M2 such that HASH(M1) = HASH(M2).
c) It should be difficult to find two messages M1 and M2 such that HASH(M1) = HASH(M2).
d) None of these
Answer: b)
Q4. What is the message digest length of MD5 and SHA-1 hash functions?
a) 32-bit, 64-bit
b) 64-bit, 128-bit
c) 128-bit, 160-bit
d) 128-bit, 256-bit
e) None of these
Answer: c) 128-bit, 160-bit
Q5. Which of the following is/are not hash functions?
a) MD5
b) Triple-DES
c) SHA-1
d) RSA
Answer: b), d)
Q6. Hash functions are faster than symmetric and public key encryption?
a) True
b) False
Answer: a) True
Q7. Which of the following is/are false for digital signature?
a) Digital signature is legally equivalent to hand-written signature.
b) In digital signature, signer uses his public key to sign.
c) Anybody having access to the signer’s public key can verify the signature.
d) None of these
Answer: a), b)
Q8. Which of the following statement(s) is/are true?
a) Secure Socket Layer (SSL) provides security to the data transferred between web browser and server.
b) SSL can be used for any network service running over TCP/IP.
c) SSL Handshake Protocol provides mutual authentication.
d) None of these
Answer: a), b), c)
Q9. Which of the following statement(s) is/are true for SSL Alert Protocol?
a) If the first byte is 1 then it indicates that this alert has no impact on the connection between sender and receiver.
b) If the first byte is 1 then the SSL connection is terminated.
c) If the first byte is 2 then it indicates that this alert has no impact on the connection between sender and receiver.
d) If the first byte is 2 then the SSL connection is terminated.
Answer: a), d)
Q10. Consider the following statements:
(i) SSL is designed to establish secure connection between two hosts.
(ii) s-HTTP is designed to send individual messages securely.
a) Only (i) is true
b) Only (ii) is true
c) Both (i) and (ii) are true
d) Both (i) and (ii) are false
Answer: c) Both (i) and (ii) are true
<< Prev- Ethical Hacking Week 6 Assignment Solutions
>> Next- Ethical Hacking Week 8 Assignment Solutions
DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.