60:00
0/30 Attempted
Your Progress
Attempted 0
Correct 0
Incorrect 0
Skipped 0
Score 0
Marks 0

Computer Networks — Test 15

Page 1 of 3

Review Skipped Questions

0
Question 1
What is Ci in the bit-by-bit XOR hash function, that is Ci = bi1 + bi2.….. + bim
0 System Administrator 2026
Question 2
When can we detect a collision if the hash values are same for two inputs, that is H(x) = H(y)?
0 System Administrator 2026
Question 3
What is the formula for pre-images of a given hash value, where data block length = b bits and hash code = n bits?
0 System Administrator 2026
Question 4
Which of the following is not a basic property for employing hash function in practical applications?
0 System Administrator 2026
Question 5
Which of the following property of the hash function makes the hash function strong?
0 System Administrator 2026
Question 6
Brute force attack does not concentrate on bit length of the hash value.
0 System Administrator 2026
Question 7
What can it be called, if an attacker determines the private key of the user, after breaking the signature scheme?
0 System Administrator 2026
Question 8
Which of the following is not a requirement of digital signatures?
0 System Administrator 2026
Question 9
Who will be the involving parties in the direct digital signature scheme?
0 System Administrator 2026
Question 10
Which of the following sentence is incorrect in case for digital signatures?
0 System Administrator 2026