Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Authentication & Integrity MCQ

1.Which of the following cryptographic techniques is primarily used for ensuring message integrity?
A) MAC
B) Hash function
C) SHA
D) Digital signature

View answer

Answer: B) Hash function
Explanation: Hash functions generate fixed-size outputs for variable-size inputs, ensuring data integrity by detecting even minor changes in the data.

2.What does MAC stand for in the context of cryptography?
A) Message Authentication Code
B) Main Authentication Cipher
C) Mutual Authentication Control
D) Master Authentication Code

View answer

Answer: A) Message Authentication Code
Explanation: MAC is a cryptographic technique used to verify the integrity and authenticity of a message.

3.Which cryptographic hash function is considered more secure and commonly used: MD5 or SHA-256?
A) MD5
B) SHA-256

View answer

Answer: B) SHA-256
Explanation: SHA-256 is a more secure hash function compared to MD5, which is vulnerable to collision attacks.

4.HMAC is an extension of which cryptographic technique?
A) MAC
B) Hash function
C) Digital signature
D) Public-key cryptography

View answer

Answer: A) MAC
Explanation: HMAC (Hash-based Message Authentication Code) is a specific type of MAC that utilizes a cryptographic hash function.

5.Which cryptographic technique involves the use of asymmetric keys for verification?
A) MAC
B) Hash function
C) Digital signature
D) HMAC

View answer

Answer: C) Digital signature
Explanation: Digital signatures provide authenticity and integrity using public-key cryptography.

6.Which authentication protocol is commonly used for securing internet communication, providing secure and encrypted connections?
A) OAuth
B) SSL/TLS
C) Kerberos
D) LDAP

View answer

Answer: B) SSL/TLS
Explanation: SSL/TLS protocols provide secure communication over the internet by encrypting data and ensuring authentication.

7.What does X.509 Digital Certificate primarily ensure in a communication?
A) Message integrity
B) Authentication
C) Authorization
D) Access control

View answer

Answer: B) Authentication
Explanation: X.509 Digital Certificates are used for authentication, ensuring that the communication parties are who they claim to be.

8.Which access control mechanism grants or denies access based on the user’s identity and their permissions?
A) Discretionary Access Control (DAC)
B) Mandatory Access Control (MAC)
C) Role-Based Access Control (RBAC)
D) Attribute-Based Access Control (ABAC)

View answer

Answer: C) Role-Based Access Control (RBAC)
Explanation: RBAC grants access based on predefined roles and permissions assigned to users.

9.In cryptographic terms, what does the term “authorization” refer to?
A) Verifying the identity of communication parties
B) Ensuring the integrity of transmitted data
C) Granting or denying access to resources based on permissions
D) Generating digital signatures for authentication

View answer

Answer: C) Granting or denying access to resources based on permissions
Explanation: Authorization involves determining what actions or resources a user is allowed to access.

10.Which of the following is NOT an example of an authentication protocol?
A) Kerberos
B) OAuth
C) SAML
D) HMAC

View answer

Answer: D) HMAC
Explanation: HMAC is a cryptographic technique, not an authentication protocol.

11.Which cryptographic technique is suitable for ensuring both data integrity and authenticity?
A) Digital signature
B) HMAC
C) Hash function
D) MAC

View answer

Answer: A) Digital signature
Explanation: Digital signatures provide both data integrity and authenticity.

12.Which hash function is considered more secure between SHA-1 and SHA-256?
A) SHA-1
B) SHA-256

View answer

Answer: B) SHA-256
Explanation: SHA-256 is more secure compared to SHA-1, which is vulnerable to collision attacks.

13.Which cryptographic technique is commonly used for securing communication between a web browser and a server?
A) HMAC
B) Digital signature
C) SSL/TLS
D) Kerberos

View answer

Answer: C) SSL/TLS
Explanation: SSL/TLS protocols are commonly used for securing web communication.

14.What does HMAC stand for?
A) Hash-based Message Authentication Code
B) Highly Mutual Authentication Cipher
C) Hyper Media Authentication Control
D) Hashed MAC

View answer

Answer: A) Hash-based Message Authentication Code
Explanation: HMAC stands for Hash-based Message Authentication Code, a specific type of MAC.

15.Which digital certificate format is widely used for securing web communication?
A) X.509
B) SSL
C) TLS
D) PEM

View answer

Answer: A) X.509
Explanation: X.509 digital certificates are widely used for securing web communication.

16.Which access control mechanism is based on assigning permissions directly to users or groups?
A) Discretionary Access Control (DAC)
B) Mandatory Access Control (MAC)
C) Role-Based Access Control (RBAC)
D) Attribute-Based Access Control (ABAC)

View answer

Answer: A) Discretionary Access Control (DAC)
Explanation: DAC allows users or groups to have control over the access permissions of their own resources.

17.Which cryptographic hash function is commonly used for generating checksums and verifying file integrity?
A) MD5
B) SHA-1
C) SHA-256
D) HMAC

View answer

Answer: C) SHA-256
Explanation: SHA-256 is commonly used for file integrity verification due to its security properties.

18.Which authentication protocol is commonly used in Windows environments for single sign-on authentication?
A) OAuth
B) SAML
C) LDAP
D) Kerberos

View answer

Answer: D) Kerberos
Explanation: Kerberos is commonly used in Windows environments for single sign-on authentication.

19.Which digital certificate format is commonly used for email encryption and code signing?
A) X.509
B) SSL
C) PGP
D) TLS

View answer

Answer: C) PGP
Explanation: Pretty Good Privacy (PGP) is commonly used for email encryption and code signing.

20.Which cryptographic technique involves using both a private key and a public key for verification?
A) MAC
B) HMAC
C) Digital signature
D) Hash function

View answer

Answer: C) Digital signature
Explanation: Digital signatures use a private key for signing and a public key for verification, ensuring authenticity and integrity.

Leave a Comment