Digital Signatures MCQs September 29, 2025 by u930973931_answers 50 Score: 0 Attempted: 0/50 Subscribe 1. : What is the main purpose of a digital signature? (A) Encrypting messages (B) Verifying authenticity and integrity (C) Data compression (D) Enhancing speed of transmission 2. : Which algorithm is commonly used for generating digital signatures? (A) AES (B) RSA (C) Blowfish (D) DES 3. : Who verifies a digital signature? (A) Sender only (B) Receiver (C) Both sender and receiver (D) Network administrator 4. : A digital signature is created using which key? (A) Public key (B) Private key (C) Symmetric key (D) Session key 5. : A digital signature is verified using which key? (A) Private key (B) Public key (C) Shared secret key (D) Hash key 6. : Which of the following ensures non-repudiation in communication? (A) Digital watermark (B) Digital signature (C) Checksum (D) Encryption 7. : Digital signatures are based on the principle of: (A) Symmetric encryption (B) Hashing and asymmetric cryptography (C) Frequency analysis (D) One-time pads 8. : Which hashing algorithm was widely used with digital signatures but now considered weak? (A) SHA-1 (B) SHA-256 (C) MD5 (D) SHA-512 9. : What is signed in a digital signature? (A) The entire plain message (B) The hash of the message (C) The key itself (D) A random nonce 10. : Which organization first standardized digital signatures? (A) IEEE (B) NIST (C) ISO (D) ITU 11. : What is the main difference between a digital signature and a handwritten signature? (A) Handwritten can be forged, digital cannot easily (B) Digital signature is always visual (C) Digital signature uses ink (D) Handwritten requires encryption 12. : Which of the following is a digital signature standard? (A) DSS (B) DMS (C) DES (D) DNS 13. : Which cryptographic method does DSS (Digital Signature Standard) primarily use? (A) AES (B) DSA (C) Blowfish (D) RSA only 14. : Which of the following is NOT a property of digital signatures? (A) Integrity (B) Authentication (C) Non-repudiation (D) Compression 15. : In which year did the U.S. adopt the Digital Signature Standard (DSS)? (A) 1985 (B) 1991 (C) 1994 (D) 2000 16. : What is the role of a Certification Authority (CA) in digital signatures? (A) To encrypt user messages (B) To issue and verify digital certificates (C) To generate private keys (D) To transmit data faster 17. : Which document format most commonly uses digital signatures? (A) .docx (B) .pdf (C) .txt (D) .csv 18. : What does a digital certificate contain? (A) User’s private key (B) Public key and identity information (C) Password of the user (D) Encrypted message 19. : Which of the following attacks aims at forging a digital signature? (A) Replay attack (B) Man-in-the-middle (C) Collision attack (D) Brute force attack 20. : Which public key infrastructure (PKI) element verifies digital signatures? (A) Key escrow (B) CA (C) RA (D) Repository 21. : Which of the following provides higher security for digital signatures? (A) Shorter keys (B) Strong hash functions (C) Plain text verification (D) Symmetric encryption 22. : Which key is kept secret in digital signatures? (A) Private key (B) Public key (C) Session key (D) None 23. : Which feature of digital signatures helps prove the identity of the sender? (A) Confidentiality (B) Authentication (C) Availability (D) Authorization 24. : Which country first legally recognized digital signatures? (A) Germany (B) United States (C) India (D) Italy 25. : What does PKCS stand for in the context of digital signatures? (A) Public Key Cryptography Standards (B) Private Key Certification System (C) Public Knowledge Cryptography Service (D) Public Key Certificate Security 26. : Which signature scheme is widely used in Bitcoin? (A) RSA (B) DSA (C) ECDSA (D) AES 27. : Which of the following is considered the strongest digital signature algorithm? (A) MD5 (B) ECDSA with large key sizes (C) SHA-1 with RSA (D) XOR cipher 28. : What is the output length of SHA-256 used in digital signatures? (A) 128 bits (B) 160 bits (C) 256 bits (D) 512 bits 29. : Which factor directly affects the speed of digital signature creation? (A) Length of public key (B) Type of hashing function (C) Size of message (D) Encryption software only 30. : Which process is involved before applying a digital signature? (A) Message hashing (B) Plain text encryption (C) Data compression (D) File transfer 31. : Which is considered more efficient for mobile devices in digital signatures? (A) RSA (B) ECDSA (C) AES (D) Blowfish 32. : Which is a drawback of digital signatures? (A) They cannot be verified (B) Require PKI infrastructure (C) They always expire instantly (D) They weaken confidentiality 33. : Which of these verifies whether a digital certificate is valid? (A) CRL (B) DNS (C) HTTP (D) URL 34. : Which of the following is NOT required for a digital signature system? (A) Hash function (B) Asymmetric key pair (C) Certification authority (D) Firewall 35. : In blockchain systems, what role do digital signatures play? (A) Mining (B) Transaction authentication (C) Data compression (D) Timestamping only 36. : Which of the following verifies if a digital certificate is still active? (A) OCSP (B) URL (C) HTTP (D) TCP/IP 37. : Which is NOT an example of a digital signature algorithm? (A) DSA (B) RSA (C) ECDSA (D) AES 38. : What is the first step in verifying a digital signature? (A) Hash the message (B) Encrypt the message (C) Generate a private key (D) Contact the CA 39. : Which of the following adds legal enforceability to digital signatures? (A) PKI (B) Digital certificates (C) Digital signature laws (D) Firewalls 40. : Which of the following standards specify electronic signatures in Europe? (A) eIDAS (B) HIPAA (C) GDPR (D) PCI-DSS 41. : Which type of attack focuses on breaking weak hash functions in digital signatures? (A) Birthday attack (B) DoS attack (C) Phishing (D) Brute force 42. : What is the key length commonly used for RSA digital signatures today? (A) 128 bits (B) 512 bits (C) 2048 bits (D) 4096 bits 43. : Which of these ensures that a signed message has not been altered? (A) Confidentiality (B) Integrity (C) Availability (D) Scalability 44. : What is the main benefit of using elliptic curve cryptography for signatures? (A) Larger key sizes (B) Smaller keys with equal strength (C) It avoids hashing (D) It is symmetric 45. : In digital signatures, who generates the hash of the message? (A) Only sender (B) Only receiver (C) Both sender and receiver (D) Certification Authority 46. : Which hash algorithm is most recommended for new digital signature systems? (A) MD5 (B) SHA-1 (C) SHA-256 (D) RC4 47. : Which of these is the strongest guarantee provided by digital signatures? (A) Confidentiality (B) Non-repudiation (C) Scalability (D) Compression 48. : Which law in the U.S. gives legal recognition to digital signatures? (A) HIPAA (B) E-SIGN Act (C) GDPR (D) SOX 49. : Which part of the PKI hierarchy ultimately trusts all digital certificates? (A) Registration Authority (B) Root CA (C) Intermediate CA (D) Repository 50. : Which is an advanced digital signature scheme that supports multiple signers? (A) Blind signatures (B) Multisignatures (C) Proxy signatures (D) None of these