InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Mix Row functions operate on the 8 × 8 matrix (A) to form the new matrix. The operation can be considered to be B = AC. The matrix C is formed by(a) each successive even row having left shifts(b) each successive row having a left shifts(c) each successive odd row having right shifts(d) each successive row having a right shiftsI got this question in an international level competition.This key question is from Whirlpool Algorithm topic in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Correct answer is (d) each SUCCESSIVE row having a RIGHT SHIFTS |
|
| 52. |
Larger networks would prefer a full decentralization.(a) True(b) FalseThis question was addressed to me in an online interview.My question is taken from Symmetric Key Distribution in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Correct option is (b) False |
|
| 53. |
When the length of the IV is not 96, then(a) we append the rest of the bits with 1*0 to make it 128 bits(b) we append the rest of the bits with 0*1 to make it 128 bits(c) we append the rest of the bits with 1*0 to make it 256 bits(d) we append the rest of the bits with 0s to make it 128 bitsThis question was addressed to me in examination.This intriguing question originated from CCM, GCM and Key Wrapping in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Correct answer is (d) we append the rest of the bits with 0S to make it 128 bits |
|
| 54. |
How many passes through the plaintext does the CCM require to generate the MAC value?(a) 2(b) 3(c) 4(d) 5I got this question in a job interview.This interesting question is from CCM, GCM and Key Wrapping topic in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» RIGHT answer is (a) 2 Easy EXPLANATION: The CCM REQUIRES 2 PASSES through the plaintext to generate the MAC value. |
|
| 55. |
Which Authentication Encryption approach is taken by the IPSec protocol?(a) Authentication followed by encryption (A→E)(b) Hashing followed by encryption (H→E)(c) Encryption followed by authentication (E→A)(d) Independently encrypt and authenticate (E + A)The question was posed to me by my school teacher while I was bunking the class.My doubt is from CCM, GCM and Key Wrapping in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right answer is (c) Encryption followed by authentication (E→A) |
|
| 56. |
In CMAC, which scenario is a different key K2 is used instead of K1?(a) If the tag is larger than the key length(b) If the tag is shorter than the key length(c) In the last step of the algorithm(d) If the plaintext/message is not an integer multiple of the cipher clock lengthThe question was posed to me in an interview for internship.Origin of the question is HMAC, DAA and CMAC in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Correct OPTION is (d) If the plaintext/message is not an integer multiple of the cipher clock length |
|
| 57. |
Which is the last step in establishing a connection between hosts using the SSM?(a) Interaction/ Handshaking between the SSM and the KDC(b) Establishment of the connection(c) Release of connection request packet(d) SSM saves the packet and applies to the KDC for connection permissionI have been asked this question in homework.My doubt stems from Symmetric Key Distribution in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right OPTION is (c) RELEASE of connection request packet |
|
| 58. |
“Meet in the middle attack” and “man in the middle attack” are the same.(a) True(b) FalseThe question was posed to me in semester exam.The question is from Symmetric Key Distribution topic in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right choice is (B) False |
|
| 59. |
Another name for the Whirlpool key is(a) CState(b) LState(c) Estate(d) KStateI had been asked this question in exam.Asked question is from Whirlpool Algorithm topic in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The CORRECT CHOICE is (d) KState |
|
| 60. |
There’s no known successful attacks made against Whirlpool.(a) True(b) FalseI got this question by my school teacher while I was bunking the class.This intriguing question originated from Whirlpool Algorithm topic in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The CORRECT option is (a) True |
|
| 61. |
Which is not true for Key-Wrapping?(a) Used for small Plain Texts(b) It has a relatively higher throughput than other modes(c) It has block size of 64 bits(d) It has n+1 cipher blocks, for n plaintext blockThis question was addressed to me in unit test.The question is from CCM, GCM and Key Wrapping in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The CORRECT OPTION is (b) It has a relatively HIGHER throughput than other modes |
|
| 62. |
Which cryptographic algorithm is used in CMAC?(a) Triple DES and AES(b) DES(c) RC-4(d) AESI have been asked this question during an interview.My question comes from HMAC, DAA and CMAC in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The correct OPTION is (a) Triple DES and AES |
|
| 63. |
MAC is a(a) one-to-one mapping(b) many-to-one mapping(c) onto mapping(d) none of the mentionedThe question was posed to me during a job interview.My query is from Message Authentication Codes (MACs) topic in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right OPTION is (B) many-to-one mapping |
|
| 64. |
Which figure implements confidentiality and authentication?I had been asked this question during an online interview.The above asked question is from Message Authentication Codes (MACs) topic in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The CORRECT choice is (a) FIG 1 |
|
| 65. |
Given a message, the expected workload of finding a message that hashes to that value is of the order ____________(a) 2^(n/2)(b) 2^(n-1)(c) 2^(n)(d) 2^(2n)I had been asked this question during an online exam.Asked question is from Whirlpool Algorithm topic in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right answer is (C) 2^(n) |
|
| 66. |
Cryptographic hash functions execute faster in software than block ciphers.(a) Statement is correct(b) Statement is incorrect(c) Depends on the hash function(d) Depends on the processorThis question was addressed to me during an interview.The doubt is from HMAC, DAA and CMAC in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right choice is (d) Depends on the PROCESSOR |
|
| 67. |
What is the value of A (0)?(a) F9*(b) A9*(c) A6*(d) F6*I got this question in an online quiz.The question is from CCM, GCM and Key Wrapping in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Correct OPTION is (C) A6* |
|
| 68. |
How many rounds are there in one Whirlpool Iteration?(a) 3(b) 4(c) 6(d) 8I had been asked this question in an interview for internship.This question is from Whirlpool Algorithm in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The correct option is (B) 4 |
|
| 69. |
Which is the correct representation for session key recovery for the plain text?(a) D ([Km XOR H], E([Km XOR H], Ks)(b) D([Km XOR H],Ks)(c) D ([Km XOR H], E([Km XOR H])(d) None of the mentionedThis question was posed to me in exam.This intriguing question originated from Symmetric Key Distribution in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The CORRECT answer is (a) D ([Km XOR H], E([Km XOR H], Ks) |
|
| 70. |
The 8 × 8 hash matrix holds values of size(a) 16 bits(b) 32 bits(c) 8 bits(d) 4 bitsI got this question by my school principal while I was bunking the class.The query is from Whirlpool Algorithm in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right option is (c) 8 bits |
|
| 71. |
The length of the message is appended to the message. What is the size of this length?(a) 256 bits(b) 512 bits(c) 128 bits(d) 1024 bitsI had been asked this question in an internship interview.Origin of the question is Whirlpool Algorithm in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Correct option is (a) 256 bits |
|
| 72. |
Which of the following is a valid disadvantage of the PRNG based on MAC function?(a) It has a high throughput(b) It takes twice the execution time(c) It is hardware intensive and can only work on high end processors(d) none of the mentionedThe question was asked during an interview for a job.Question is taken from CCM, GCM and Key Wrapping topic in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» CORRECT answer is (B) It TAKES twice the execution time For EXPLANATION: It takes twice the execution time, because HMAC involves two executions of the underlying hash function for each output block. |
|
| 73. |
The key Wrapping Algorithm provides confidentiality and data integrity.(a) True(b) FalseI have been asked this question during an internship interview.Enquiry is from CCM, GCM and Key Wrapping in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» RIGHT OPTION is (a) TRUE Easy EXPLANATION: The STATEMENT is true. |
|
| 74. |
What is the size of the key in the algorithm?(a) 256 bits(b) 512 bits(c) 128 bits(d) 1024 bitsThis question was addressed to me in an international level competition.Question is taken from Whirlpool Algorithm in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Correct OPTION is (B) 512 BITS |
|
| 75. |
Certificates generated by X that are the certificates of other CAs are Reverse Certificates.(a) True(b) FalseI got this question during an internship interview.The doubt is from Public Keys and X.509 Certificates-II topic in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» CORRECT answer is (a) TRUE The BEST explanation: The STATEMENT is true. Certificates of X generated by other CAs are forward certificates. |
|
| 76. |
The Round Constant is given by S[8(r-1)+j]. What are the limits of ‘r’?(a) 0 |
|
Answer» RIGHT answer is (C) 0 <= r <= 10 Explanation: r can have values from 0 to 10. |
|
| 77. |
What is the full-form of CMAC?(a) Code-based MAC(b) Cipher-based MAC(c) Construct-based MAC(d) Collective-based MACThis question was posed to me in an interview for internship.My doubt is from HMAC, DAA and CMAC in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The CORRECT OPTION is (b) Cipher-based MAC |
|
| 78. |
What is the value of ipad in the HMAC structure?(a) 00111110(b) 00110010(c) 10110110(d) 01110110The question was asked in an interview for job.My question is taken from HMAC, DAA and CMAC topic in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» RIGHT OPTION is (b) 00110010 Explanation: IPAD is 36 in hexadecimal. |
|
| 79. |
For a 100 bit key and a 32 bit tag, how many possible keys can be produced in the 3rd round?(a) 2^4(b) 2^32(c) 2^16(d) 2^64I have been asked this question in a job interview.Query is from Message Authentication Codes (MACs) topic in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Correct answer is (a) 2^4 |
|
| 80. |
Another name for Message authentication codes is(a) cryptographic codebreak(b) cryptographic codesum(c) cryptographic checksum(d) cryptographic checkbreakThe question was asked during an interview.My question comes from Message Authentication Codes (MACs) topic in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The correct choice is (c) CRYPTOGRAPHIC CHECKSUM |
|
| 81. |
For a 150-bit message and a 10-bit MAC, how many values are the MAC value dependent on?(a) 2^140(b) 2^150(c) 2^15(d) 2^10The question was asked in exam.I'd like to ask this question from Message Authentication Codes (MACs) topic in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» RIGHT CHOICE is (a) 2^140 To EXPLAIN I WOULD SAY: 2^150/2^10 = 2^140. |
|
| 82. |
Which of the following is not a part of an Extension?(a) Extension Identifier(b) Extension value(c) Criticality Indicator(d) All of the mentioned constitute the ExtensionThis question was addressed to me during an interview.My doubt stems from Public Keys and X.509 Certificates-II topic in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» CORRECT answer is (d) All of the mentioned CONSTITUTE the EXTENSION To explain I WOULD say: Extension Identifier, Extension value and the Criticality Indicator all constitue the Extension header. |
|
| 83. |
Extensions were added in which version?(a) 1(b) 2(c) 3(d) 4This question was posed to me in unit test.The question is from Public Keys and X.509 Certificates-II topic in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» RIGHT ANSWER is (c) 3 Best explanation: Extensions to the X.509 certificates were ADDED in VERSION 3. |
|
| 84. |
What is the PGP stand for?(a) Permuted Gap Permission(b) Permuted Great Privacy(c) Pretty Good Permission(d) None of the mentionedThe question was posed to me by my school principal while I was bunking the class.This question is from Public Keys and X.509 Certificates-I in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right OPTION is (d) None of the mentioned |
|
| 85. |
Sometimes a simple tag is introduced along with the session key. This tag has 8 bits. Which of the following options is wrong?(a) One bit indicates whether the key is a session key or a master key(b) One bit indicates whether the key can be used for encryption(c) Three bit indicates whether the key can be used for decryption(d) Remaining bits are for future useI have been asked this question by my college professor while I was bunking the class.This intriguing question comes from Symmetric Key Distribution in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right choice is (c) THREE BIT indicates whether the key can be USED for DECRYPTION |
|
| 86. |
“Meet in the middle attack” is an attack(a) where the timing required for the attack via brute force is drastically reduced(b) where the adversary uses 2 or more machines to decrypt thus trying to reduce the time(c) where messages are intercepted and then either relayed or substituted with another message(d) where cryptanalysis takes lesser time than the brute force decryptionThe question was asked in unit test.I'm obligated to ask this question of Symmetric Key Distribution topic in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» RIGHT option is (c) where messages are intercepted and then either relayed or substituted with another MESSAGE The EXPLANATION is: “Meet in the middle ATTACK” is an attack where messages are intercepted and then either relayed or substituted with another message. |
|
| 87. |
PDU stands for(a) Protocol data unit(b) Pre data underscore(c) Permuted data unity(d) Protocol data untiyThe question was posed to me in unit test.I need to ask this question from Symmetric Key Distribution in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Correct answer is (a) PROTOCOL DATA unit |
|
| 88. |
Which of the following hexadecimal values are not present in the matrix C of the Mix Rows function?(a) 01(b) 09(c) 05(d) 03The question was asked in an online quiz.I would like to ask this question from Whirlpool Algorithm in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The CORRECT ANSWER is (d) 03 |
|
| 89. |
The S-box implements linear mapping thus providing diffusion.(a) True(b) FalseI got this question in exam.Origin of the question is Whirlpool Algorithm topic in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right ANSWER is (b) False |
|
| 90. |
What is the value of opad in the HMAC structure?(a) 00111110(b) 00110010(c) 10110110(d) 01011100This question was addressed to me by my school teacher while I was bunking the class.My doubt stems from HMAC, DAA and CMAC topic in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Correct OPTION is (d) 01011100 |
|
| 91. |
What is the size of the s-box table/matrix in Whirlpool?(a) 8 × 8(b) 16 × 16(c) 8 × 16(d) 16 × 8This question was addressed to me in an international level competition.I'm obligated to ask this question of Whirlpool Algorithm in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» CORRECT choice is (B) 16 × 16 To explain: The SIZE of the matrix is 16 × 16. |
|
| 92. |
Hashing followed by encryption (H→E) is used by which algorithm?(a) IPSec(b) SSH(c) WEP(d) SSL/TLSI had been asked this question by my college professor while I was bunking the class.This key question is from CCM, GCM and Key Wrapping in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Correct CHOICE is (C) WEP |
|
| 93. |
Which Authentication Encryption approach is taken by the SSL/TLS protocol?(a) Hashing followed by encryption (H→E)(b) Encryption followed by authentication (E→A)(c) Authentication followed by encryption (A→E)(d) Independently encrypt and authenticate (E + A)This question was posed to me by my college director while I was bunking the class.This question is from CCM, GCM and Key Wrapping in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» CORRECT option is (C) Authentication FOLLOWED by ENCRYPTION (A→E) The explanation is: Authentication followed by encryption (A→E) is the AE approach taken by the SSL/TLS PROTOCOL. |
|
| 94. |
Which one of the following is not a public key distribution means?(a) Public-Key Certificates(b) Hashing Certificates(c) Publicly available directories(d) Public-Key authorityI got this question in a job interview.Query is from Public Keys and X.509 Certificates-I topic in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right answer is (b) HASHING CERTIFICATES |
|
| 95. |
Public key encryption/decryption is not preferred because(a) it is slow(b) it is hardware/software intensive(c) it has a high computational load(d) all of the mentionedI got this question in an international level competition.This interesting question is from Public Keys and X.509 Certificates-I topic in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» RIGHT choice is (d) all of the mentioned The explanation is: DUE to high computational load ( THUS being SLOW ) public key systems are not preferred for large cryptosystems and large networks. |
|
| 96. |
How many round constants (RCs) are required in Whirlpool?(a) 10(b) 11(c) 12(d) 21The question was posed to me in semester exam.My question comes from Whirlpool Algorithm topic in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The correct answer is (a) 10 |
|
| 97. |
Which one of these is not a Whirlpool function?(a) Add Key(b) Substitute Bytes(c) Mix Rows(d) Shift RowsI had been asked this question in an online quiz.This intriguing question comes from Whirlpool Algorithm topic in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» CORRECT option is (d) Shift Rows To elaborate: Shift columns is a VALID OPERATION. Rows are not shifted. |
|
| 98. |
The hash matrix of 8 × 8 is preferred over a 16 × 4 matrix because(a) it is symmetric(b) it is smaller in size(c) it is faster in computation(d) none of the mentionedI got this question in exam.This is a very interesting question from Whirlpool Algorithm topic in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The CORRECT answer is (c) it is FASTER in computation |
|
| 99. |
Data Authentication Algorithm (DAA) is based on(a) DES(b) AES(c) MD-5(d) SHA-1I have been asked this question in an interview.The origin of the question is HMAC, DAA and CMAC in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» Right choice is (a) DES |
|
| 100. |
Publicly Available directory is more secure than which other system?(a) Public-Key Certificates(b) Public announcements(c) Public-Key authority(d) None of the mentionedI had been asked this question by my college director while I was bunking the class.Asked question is from Public Keys and X.509 Certificates-I in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» RIGHT answer is (b) Public ANNOUNCEMENTS The best I can explain: Publicly Available DIRECTORY is more SECURE than Public announcements. |
|