Updated Final Exam Questions With Answers
Updated Final Exam Questions With Answers
True/False Questions
1. Message Authentication Codes (MACs) are symmetric key primitives designed to prevent
3. Encrypt-then-authenticate is the most secure approach for authenticated encryption. (T/F) - True
5. CBC-MAC is only secure when used without an initialization vector (IV). (T/F) - True
6. Merkle trees can reduce client storage requirements to O(1). (T/F) - True
7. The birthday attack on hash functions requires evaluating 2^l+1 inputs to guarantee finding a
9. Using timestamps can mitigate replay attacks, but the window for replay must be carefully
11. CBC-MAC can handle variable-length messages without any modifications. (T/F) - False
12. The Encrypt-then-Authenticate approach verifies the MAC before decryption. (T/F) - True
13. Hash functions used in HMAC must always be collision-resistant. (T/F) - True
14. Using the same key for encryption and MAC in authenticated encryption is secure. (T/F) - False
15. A preimage-resistant hash function ensures that given H(x), it's infeasible to find x. (T/F) - True
16. Digital signatures provide authenticity and integrity without the need for shared keys. (T/F) - True
17. Replay attacks involve the adversary modifying message contents. (T/F) - False
18. In the Birthday Attack, the probability of finding a collision increases linearly with the number of
19. SHA-1 is still considered secure for most applications. (T/F) - False
20. Merkle trees enable efficient verification of individual blocks in a dataset. (T/F) - True
Multiple-Choice Questions
1. Which of the following is a MAC algorithm operation?
A. Key generation
B. Tag generation
C. Verification
Answer: D
A. Sequence numbers
B. Timestamps
D. Both A and B
Answer: D
A. Preimage resistance
B. Collision resistance
D. Randomness
Answer: D
4. The length of a hash function output should be ___ to achieve 128-bit security against birthday
attacks.
A. 128 bits
B. 256 bits
C. 512 bits
Answer: B
Answer: A
A. SHA-1
B. MD5
C. SHA-256
D. SHA-3
Answer: B
Answer: B
A. Confidentiality
B. Authenticity
C. Integrity
D. Both B and C
Answer: D
D. The use of IV
Answer: B
A. MD5
B. SHA-1
C. SHA-2
Answer: C
Answer: A
A. Authenticate-then-Encrypt
B. Encrypt-then-Authenticate
C. Encrypt-and-Authenticate
Answer: B
13. The minimum output length for a cryptographic hash function to achieve 112-bit security against
A. 112 bits
B. 224 bits
C. 256 bits
D. 512 bits
Answer: B
B. Sequence numbers
C. Timestamps
Answer: D
15. Which property differentiates a cryptographic hash function from a keyed hash function?
A. Collision resistance
B. Preimage resistance
D. Key dependency
Answer: D
A. 128 bits
B. 160 bits
C. 256 bits
D. 1024 bits
Answer: C
17. What is the advantage of Merkle trees over hashing all files into one hash?
Answer: D
Answer: B
A. MD5
B. SHA-1
C. CBC-MAC
D. SHA-3
Answer: C
A. Randomized output
D. Both B and C
Answer: D
True/False Questions
21. A cryptographic system that uses the same key for encryption and decryption is called
Answer: True
22. Using a timestamp in messages guarantees prevention against all types of replay attacks. (T/F)
Answer: False ? Timestamps reduce the risk but do not completely eliminate replay attacks.
23. A deterministic MAC algorithm can lead to information leakage about the message. (T/F)
Answer: True
24. A collision-resistant hash function guarantees that no two inputs will ever produce the same
hash. (T/F)
Answer: False ? Collisions are theoretically possible but should be computationally infeasible to find.
25. Encrypting the same message with the same key using CBC mode and without an IV ensures
26. HMAC is secure even if the underlying hash function is not collision-resistant. (T/F)
Answer: True ? HMAC remains secure as long as the hash function has certain basic properties.
27. Reflection attacks can be prevented by including a unique session identifier in each message.
(T/F)
Answer: True
28. If the output of a hash function is 512 bits, it provides 512 bits of security. (T/F)
Answer: False ? Security is approximately half the output length due to the birthday paradox.
29. In authenticated encryption, verifying the MAC after decryption can expose the system to
Answer: True
30. Digital signatures can be used to verify the authenticity of a message even without a shared
secret. (T/F)
Answer: True
21. A company uses a shared symmetric key for generating MACs to authenticate messages. Which
22. What happens if a cryptographic system uses the same key for both encryption and
authentication?
23. You receive a message with a timestamp that is 10 minutes old. Which of the following is most
likely true?
? A. Truncation attacks
? C. Replay attacks
? D. Birthday attacks
? C. A symmetric key
? D. A shared secret
? A. To ensure confidentiality
27. If an adversary replaces the MAC of a message with their own, what would happen during
verification?
28. Which of the following is an efficient way to ensure integrity in cloud storage with minimal client
storage?
29. Why does adding an index and length to each block in a MAC prevent re-ordering and truncation
attacks?
30. What property ensures that a hash function cannot be used to find the original input from its
output?
? A. Collision resistance
? B. Preimage resistance
? D. Key independence