Are you looking for help in nptel ethical hacking assignment 7 answers? So, here in this article, we have provided you ethical hacking assignment 7 answer’s hint.

## NPTEL Ethical Hacking Assignment 7 Answers (Week 7)

**Q1. Two messages M1 and M2 are fed to a hash function HASH to generate the hash values:**

H1 = HASH (M1)

H2= HASH (M2)

**When do we say there is a collision?**

a. H1 = H2.

b. M1 = M2.

c. H1 = HASH (H2).

d. None of these.

**Answer:** a. H1 = H2.

**For instant notification of future updates Join us on telegram.**

**Q2. What do you mean by first preimage resistance in the context of hash functions?**

a. Except for few hash values H, it is difficult to find a message M such that HASH(M) = H.

b. Given a message M1, it is difficult to find another message M2 such that HASH(M1) = HASH(M2).

c. It is difficult to find two messages M1 and M2 such that HASH(M1) = HASH(M2).

d. None of these

**Answer**: a. Except for few hash values H, it is difficult to find a message M such that HASH(M) = H.

**Q3. What kind of mapping does a hash function implement?**

a. One-to-one mapping

b. Many-to-one mapping

c. One-to-many mapping

d. Many-to-many mapping

**Answer:** b. Many-to-one mapping

**Q4.** **Which of the following is/are not hash functions?**

a. MD5

b. Triple-DES

c. SHA-1

d. RSA

**Answer:** b. Triple-DES

d. RSA

**Q5. Which of the following algorithms are the slowest and the fastest?**

a. Hash function, Symmetric-key encryption

b. Public-key encryption, Symmetric-key encryption

c. Symmetric-key encryption, Hash function

d. None of these

**Answer:** d. None of these

**Q6. What are the block size of DES algorithm and the hash digest size of MD5 algorithm?**

a. 64 bits, 64 bits

b. 56 bits, 128 bits

c. 64 bits, 128 bits

d. 64 bits, 256 bits

**Answer:** c. 64 bits, 128 bits

**Q7. On which cryptographic algorithm can the birthday attack be mounted?**

a. Cryptographic hash function

b. Symmetric-key cryptography

c. Public-key cryptography

d. Diffie-Hellman key exchange

e. None of these

**Answer:** a. Cryptographic hash function

**Q8. What kinds of algorithms are typically used in the computation of digital signature?**

a. Cryptographic hash function

b. Symmetric-key encryption

c. Public-key encryption

d. All of these

**Answer:** c. Public-key encryption

**Q9. The SSL record protocol is responsible for**

a. Data encryption

b. Data authentication

c. Non repudiation

d. All of these

**Answer:** d. All of these

**Q10. Which of the following security protocols work above the IP layer in the TCP/IP protocol stack?**

a. IPSec

b. TLS

c. SSL

d. HTTPS

**Answer:** b. TLS

c. SSL

d. HTTPS

**Disclaimer:** These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself.

**Also Available:**

An Introduction to Artificial Intelligence NPTEL Assignment 7 Answers