Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

101.

PGP makes use of which cryptographic algorithm?(a) DES(b) AES(c) RSA(d) RabinThis question was addressed to me in unit test.Question is from Public Keys and X.509 Certificates-I in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security

Answer» CORRECT option is (C) RSA

The explanation: PGP recommends the use of RSA.
102.

The Round Constant is dependent on the s-box values.(a) True(b) FalseI have been asked this question in exam.My doubt stems from Whirlpool Algorithm topic in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security

Answer»

Correct option is (a) True

Easiest EXPLANATION: The Round Constant is GIVEN by S[8(r-1)+j] where S is the s-box permutation.

103.

The subject unique identifier of the X.509 certificates was added in which version?(a) 1(b) 2(c) 3(d) 4I have been asked this question by my school principal while I was bunking the class.This intriguing question originated from Public Keys and X.509 Certificates-II in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security

Answer»

The correct choice is (B) 2

Easy explanation: The SUBJECT unique identifier was ADDED in the 2ND version.

104.

SSM stands for(a) Secure Security Module(b) Session Security Module(c) Service Session Module(d) Session Service ModuleThe question was posed to me at a job interview.My question comes from Symmetric Key Distribution topic in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security

Answer»

The correct ANSWER is (b) SESSION Security MODULE

Explanation: SSM STANDS for Session Security Module.

105.

For a network with N nodes, how many master keys are present?(a) N(N-1)/2(b) N(c) N(N+1)/2(d) N/2This question was addressed to me in a national level competition.My doubt is from Symmetric Key Distribution topic in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security

Answer»

The correct CHOICE is (b) N

For EXPLANATION: Each NODE has a master key to RECEIVE the session keys from the Key Distribution CENTRE (KDC).

106.

In GCM, we define S as S = GHASH(A||0^v||C||0^u||[len(A)]||[len(C)]). What is v defined as?(a) 64 ceil[len (A)/128] – len (A)(b) 64 ceil[len (C)/128] – len (C)(c) 128 ceil[len (A)/128] – len (A)(d) 128 ceil[len (C)/128] – len (C)I have been asked this question during an online exam.This intriguing question originated from CCM, GCM and Key Wrapping in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security

Answer» RIGHT ANSWER is (c) 128 ceil[LEN (A)/128] – len (A)

Best explanation: v = 128 ceil[len (A)/128] – len (A).
107.

K2 is derived by left shifting L by 2 bits. What is L defined as?(a) E(K , 0^b)(b) E(K , 10*^b)(c) E(K , 1^b)(d) E(K , 10*1^b)I had been asked this question in a national level competition.This question is from HMAC, DAA and CMAC topic in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security

Answer» CORRECT answer is (a) E(K , 0^b)

To EXPLAIN: L is DEFINED as encrypting b-bits of 0s with the key K through the same algorithm.
108.

Confidentiality can only be provided if we perform message encryption before the MAC generation.(a) True(b) FalseThe question was asked in an interview for internship.This intriguing question originated from Message Authentication Codes (MACs) topic in chapter Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security

Answer»

Correct OPTION is (B) False

The best explanation: Confidentiality can be provided EVEN if we PERFORM message encryption after the MAC generation.