Digital Signatures — Test 1
Page 1 of 1
Question 1
What can it be called, if an attacker determines the private key of the user, after breaking the signature scheme?
0
System Administrator 2026
Question 2
Which of the following is not a requirement of digital signatures?
0
System Administrator 2026
Question 3
Who will be the involving parties in the direct digital signature scheme?
0
System Administrator 2026
Question 4
Which of the following sentence is incorrect in case for digital signatures?
0
System Administrator 2026
Question 5
What is the advantage of digital signing a hash instead of signing the entire data in RSA?
0
System Administrator 2026
Question 6
Which of the following cannot be achieved by the digital signature in symmetric key encryption?
0
System Administrator 2026
Question 7
Which of the following digital signature technique is based on elliptic curve cryptography?
0
System Administrator 2026
Question 8
Which of the following is not a digital signature algorithm?
0
System Administrator 2026
Question 9
In which year, NIST proposed Elgamal algorithm in its new DSS(digital signature standard)?
0
System Administrator 2026
Question 10
A signature function must be performed before the confidentiality function on a plain text in symmetric key digital signatures.
0
System Administrator 2026