Ethical Hacking MCQs [13]

1) What is meant by authentication?

a. Ensuring confidentiality of data.
b. Verifying the identity of the sender.
c. Digitally signing of a document.
d. None of these.


Answer: b


Solution: Authentication refers to the process of verifying the identity of the sender of a message. Hence, the correct option is (b).


2) Consider a mono-alphabetic cipher with the following key value:
(A B C D H G F E I J K L P O N M Q R S T X W V U Y Z)
What will be the encrypted form of the message “V I O L E T” ?

a. W I N L H T
b. W K N J H R
c. I O L E T V
d. None of these.


Answer: a


Solution: According to the specified key, the letter ‘V’ maps to ‘W’, ‘I’ maps to ‘I’, ‘O’ maps to ‘N’, ‘L’ maps to ‘L’, ‘E’ maps to ‘H’, and ‘T’ maps to ‘T’. Hence the encrypted form of “VIOLET” will be “WINLHT”. Hence, the correct option is (a).


3) For key sizes 128 bits, 192 bits and 256 bits respectively, the number of AES rounds required is

a. 10, 11 and 12
b. 8, 10 and 12
c. 10, 12 and 14
d. 9, 10 and 11


Answer: c


Solution: Follows from the definition of the AES algorithm.


4) For authentication using public-key cryptography, encryption is carried out using

a. Receiver’s public key
b. Receiver’s private key
c. Sender’s public key
d. Sender’s private key


Answer: d


Solution: If you want to carry out authentication between a sender A and a receiver B using public-key cryptography, A will encrypt some known message using A’s private key, so that it can be correctly decrypted by the receiver B using A’s public key and confirm the source. Hence, the correct option is (d).


5) One weakness of Diffie-Hellman key exchange protocol is

a. It can be easily broken using brute force attack.
b. It is susceptible to man-in-the-middle attack.
c. The key size is small.
d. None of these.


Answer: b


Solution: Diffie-Hellman key exchange protocol is vulnerable to the man-in-the-middle attack. Hence, the correct option is (b).

Leave a Reply

Up ↑

%d bloggers like this: