NPTEL Ethical Hacking Week 7 Assignment Answers 2024

Sanket
By Sanket

NPTEL Ethical Hacking Week 7 Assignment Answers 2024

1. Consider a hash function H that generates hash values h1 and h2, when fed with messages m1 and m2 respectively. Which of the following options can never be true?

a. h1 and h2 are equal, but m1 and m2 are unequal.
b. m1 and m2 are equal, but h1 and h2 are unequal.
c. None of these.

Answer :- For Answers Click Here 

2. What is meant by collision in the context of hashing?

a. More than one different messages can generate the same hash value.
b. After encryption, the ciphertexts corresponding to two or more plaintexts are the same.
c. The hash function generates the all zero string as the hash value.
d. None of these.

Answer :- For Answers Click Here 

3. Which of the following does not correspond to the first preimage resistance in the context of hash functions?

a. It is difficult to find a message M such that HASH(M) = H, except for a few hash values H.
b. Given a message M1, it is difficult to find another message M2 such that HASH(M1) = HASH(M2).
c. It is difficult to find two messages M1 and M2 such that HASH(M1) and HASH(M2) and unequal.
d. None of these.

Answer :- For Answers Click Here 

4. Which of the following is/are false for Unkeyed hash function (Modification Detection Code)?

a. Unkeyed hash function is used to preserve integrity of message.
b. Unkeyed hash function is used to authenticate source of message.
c. Unkeyed hash function produces an output that depends only on the input data.
d. None of these.

Answer :- 

5. Which of the following statements) is/are true?

a. Hashing realizes a one-to-one mapping.
b. Encryption realizes a one-to-one mapping.
c. Hashing realizes a many-to-one mapping.
d. Encryption realizes a many-to-one mapping.

Answer :- 

6. Which of the following are hash functions?

a. MD5
b. Triple-DES
c. SHA-1
d. AES

Answer :- For Answers Click Here 

7. Hash functions are slower as compared to symmetric and public key encryption.

a. True
b. False

Answer :- 

8. What are the block size and key size of the DES algorithm?

a. 64 bits, 56 bits
b. 56 bits, 64 bits
c. 64 bits, 64 bits
d. 64 bits, 128 bits

Answer :- 

9. Which of the following is/are true for digital signature?

a. Digital signature is legally equivalent to hand-written signature.
b. In digital signature, signer uses his public key to sign.
c. Anybody having access to the signer’s public key can verify the signature.
d. None of these.

Answer :- 

10. The SSL record protocol is responsible for

a. High-speed data transmission
b. Data authentication
c. Non repudiation
d. None of these

Answer :- For Answers Click Here 
Share This Article
Leave a comment