Sign Up

Sign In

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

You must login to ask a question.

NPTEL Ethical Hacking Assignment 7 Answers 2022

Are you looking for help in nptel ethical hacking assignment 7 answers? So, here in this article, we have provided you ethical hacking assignment 7 answer’s hint.

NPTEL Ethical Hacking Assignment 7 Answers (Week 7)

Q1. Two messages M1 and M2 are fed to a hash function HASH to generate the hash values:

H1 = HASH (M1)
H2= HASH (M2)

When do we say there is a collision?

a. H1 = H2.
b. M1 = M2.
c. H1 = HASH (H2).
d. None of these.

Answer: a. H1 = H2.

For instant notification of future updates Join us on telegram.


Q2. What do you mean by first preimage resistance in the context of hash functions?

a. Except for few hash values H, it is difficult to find a message M such that HASH(M) = H.

b. Given a message M1, it is difficult to find another message M2 such that HASH(M1) = HASH(M2).

c. It is difficult to find two messages M1 and M2 such that HASH(M1) = HASH(M2).

d. None of these

Answer: a. Except for few hash values H, it is difficult to find a message M such that HASH(M) = H.


Q3. What kind of mapping does a hash function implement?

a. One-to-one mapping

b. Many-to-one mapping

c. One-to-many mapping

d. Many-to-many mapping

Answer: b. Many-to-one mapping


Q4. Which of the following is/are not hash functions?

a. MD5

b. Triple-DES

c. SHA-1

d. RSA

Answer: b. Triple-DES

d. RSA


Q5. Which of the following algorithms are the slowest and the fastest?

a. Hash function, Symmetric-key encryption

b. Public-key encryption, Symmetric-key encryption

c. Symmetric-key encryption, Hash function

d. None of these

Answer: d. None of these


Q6. What are the block size of DES algorithm and the hash digest size of MD5 algorithm?

a. 64 bits, 64 bits

b. 56 bits, 128 bits

c. 64 bits, 128 bits

d. 64 bits, 256 bits

Answer: c. 64 bits, 128 bits


Q7. On which cryptographic algorithm can the birthday attack be mounted?

a. Cryptographic hash function

b. Symmetric-key cryptography

c. Public-key cryptography

d. Diffie-Hellman key exchange

e. None of these

Answer: a. Cryptographic hash function


Q8. What kinds of algorithms are typically used in the computation of digital signature?

a. Cryptographic hash function

b. Symmetric-key encryption

c. Public-key encryption

d. All of these

Answer: c. Public-key encryption


Q9. The SSL record protocol is responsible for

a. Data encryption

b. Data authentication

c. Non repudiation

d. All of these

Answer: d. All of these


Q10. Which of the following security protocols work above the IP layer in the TCP/IP protocol stack?

a. IPSec

b. TLS

c. SSL

d. HTTPS

Answer: b. TLS

c. SSL

d. HTTPS


Disclaimer: These answers are provided only for the purpose to help students to take references. This website does not claim any surety of 100% correct answers. So, this website urges you to complete your assignment yourself.


Also Available:

An Introduction to Artificial Intelligence NPTEL Assignment 7 Answers

NPTEL Ethical Hacking Assignment 8 Answers

Related Posts