Hash Functions MCQs

50 Score: 0 Attempted: 0/50 Subscribe
1. : What is the primary purpose of a hash function?





2. : Which of the following is a widely used cryptographic hash function?





3. : Which property ensures small input changes cause drastic output changes?





4. : What does “collision resistance” mean in hash functions?





5. : Which hash function is considered broken?





6. : What is the output size of MD5 hash function?





7. : Which property makes hash functions one-way?





8. : Which of these is NOT a cryptographic hash function?





9. : What is the output size of SHA-256?





10. : Which application uses hash functions?





11. : Which property ensures no one can derive input from output?





12. : Which function generates different hashes for slightly different inputs?





13. : Which is a major application of hash functions in cryptocurrencies?





14. : Which hash function family does SHA belong to?





15. : What is a hash collision?





16. : What does second pre-image resistance mean?





17. : Which of these algorithms belongs to SHA-2 family?





18. : Which hash function is used in Bitcoin mining?





19. : Which property ensures efficiency of hash functions?





20. : Which algorithm won the NIST competition to become SHA-3?





21. : Which hash function has a 160-bit output?





22. : Which is NOT a property of good cryptographic hash function?





23. : Which application uses hash functions for integrity verification?





24. : Which hash function is considered most secure currently?





25. : Which is the main difference between SHA-2 and SHA-3?





26. : Which is NOT an application of hash functions?





27. : Which hash function is commonly used in Git for file integrity?





28. : Which output size does SHA-512 produce?





29. : What is the avalanche effect in hashing?





30. : Which is a non-cryptographic hash function?





31. : Which property prevents attackers from predicting outputs?





32. : Which of these is an outdated hash function vulnerable to attacks?





33. : Which property ensures hash function is deterministic?





34. : Which hash function produces 224-bit output?





35. : Which is the main use of salted hashes?





36. : Which algorithm is designed for password hashing?





37. : Which hash function is used in Ethereum?





38. : Which property ensures hash functions resist second input attacks?





39. : Which is the hash function used in digital certificates (SSL/TLS)?





40. : Which of these is the oldest hash function?





41. : Which application of hash function is used in data deduplication?





42. : Which hash function supports variable-length output?





43. : Which technique improves password storage security?





44. : Which hash function is resistant against length extension attacks?





45. : Which property prevents hash output prediction?





46. : Which algorithm is designed as a replacement for MD5 and SHA-1?





47. : Which hash function uses sponge construction?





48. : Which is the major risk of weak hash functions?





49. : Which cryptographic attack exploits collisions in hash functions?





50. : Which hash algorithm is used in DNSSEC for domain authentication?





Leave a Comment

All copyrights Reserved by MCQsAnswers.com - Powered By T4Tutorials