System Administrator 2026
Which of the following is the disadvantage of asymmetric cryptography?
  • A. No need of key distribution
  • B. Security
  • C. Using digital signatures
  • D. Used to decrypt small messages
What is/are the property(s) of a good hash function in case of producing outputs for set of inputs?
  • A. Apparently random hash values
  • B. Evenly distributed hash values
  • C. Apparently random and evenly distributed values
  • D. Evenly distributed but not apparently random values
What is the core objective of the hash functions in producing hash values?
  • A. Integrity
  • B. Authenticity
  • C. Confidentiality
  • D. Security
What is the name for hash functions that are used in security applications?
  • A. Secured hash function
  • B. Cryptographic hash function
  • C. Security hash function
  • D. Crypt-analysis hash function
Which of the following application in which hash function is employed, refers hash value as message digest?
  • A. Message authentication
  • B. Virus detection
  • C. Digital signatures
  • D. One-way password file
What is the other name for key hash function, which is used in message authentication?
  • A. Message administration control
  • B. Message authentication code
  • C. Message administration code
  • D. Message authentication control
What is Ci in the bit-by-bit XOR hash function, that is Ci = bi1 + bi2.….. + bim
  • A. Number of n bit blocks
  • B. Ith bit of the hash code
  • C. Ith bit in jth block
  • D. Xor operation