Hash Functions MCQs September 29, 2025 by u930973931_answers 50 Score: 0 Attempted: 0/50 Subscribe 1. : What is the primary purpose of a hash function? (A) To compress files (B) To encrypt data (C) To map input to a fixed-size output (D) To generate random numbers 2. : Which of the following is a widely used cryptographic hash function? (A) SHA-256 (B) DES (C) RSA (D) ECC 3. : Which property ensures small input changes cause drastic output changes? (A) Pre-image resistance (B) Avalanche effect (C) Collision resistance (D) Reversibility 4. : What does “collision resistance” mean in hash functions? (A) Two inputs give different outputs (B) Two inputs give same output (C) It is impossible to find two inputs with the same hash (D) Output size is fixed 5. : Which hash function is considered broken? (A) SHA-1 (B) SHA-256 (C) SHA-3 (D) BLAKE2 6. : What is the output size of MD5 hash function? (A) 128 bits (B) 160 bits (C) 256 bits (D) 512 bits 7. : Which property makes hash functions one-way? (A) Reversibility (B) Pre-image resistance (C) Scalability (D) Key exchange 8. : Which of these is NOT a cryptographic hash function? (A) SHA-512 (B) Whirlpool (C) AES (D) MD5 9. : What is the output size of SHA-256? (A) 64 bits (B) 128 bits (C) 256 bits (D) 512 bits 10. : Which application uses hash functions? (A) Digital signatures (B) File compression (C) Random number generation (D) Video streaming 11. : Which property ensures no one can derive input from output? (A) Pre-image resistance (B) Second pre-image resistance (C) Collision resistance (D) Entropy 12. : Which function generates different hashes for slightly different inputs? (A) Symmetric encryption (B) Hash function (C) Digital watermark (D) Compression 13. : Which is a major application of hash functions in cryptocurrencies? (A) Mining and block creation (B) Wallet design (C) Smart contracts (D) Gas fee calculation 14. : Which hash function family does SHA belong to? (A) Secure Hash Algorithm (B) Standard Hash Algorithm (C) Secret Hash Algorithm (D) System Hash Algorithm 15. : What is a hash collision? (A) Two different inputs producing same hash output (B) Two miners solving same puzzle (C) Two blocks having same nonce (D) Two signatures matching 16. : What does second pre-image resistance mean? (A) Hard to find input for given output (B) Hard to find two different inputs with same output (C) Hard to reverse a hash (D) Hard to guess private key 17. : Which of these algorithms belongs to SHA-2 family? (A) SHA-1 (B) SHA-224 (C) Whirlpool (D) BLAKE3 18. : Which hash function is used in Bitcoin mining? (A) MD5 (B) SHA-256 (C) DES (D) AES 19. : Which property ensures efficiency of hash functions? (A) Must be slow to compute (B) Must be fast to compute (C) Must require keys (D) Must use random values 20. : Which algorithm won the NIST competition to become SHA-3? (A) BLAKE (B) Keccak (C) Whirlpool (D) Haval 21. : Which hash function has a 160-bit output? (A) SHA-1 (B) MD5 (C) SHA-256 (D) SHA-512 22. : Which is NOT a property of good cryptographic hash function? (A) Collision resistance (B) Determinism (C) Reversibility (D) Avalanche effect 23. : Which application uses hash functions for integrity verification? (A) Checksums (B) Streaming (C) Cloud storage (D) Compression 24. : Which hash function is considered most secure currently? (A) SHA-1 (B) MD5 (C) SHA-3 (D) CRC32 25. : Which is the main difference between SHA-2 and SHA-3? (A) Key length (B) Internal structure (Merkle–Damgård vs sponge) (C) Output size (D) Block size 26. : Which is NOT an application of hash functions? (A) Password storage (B) Message integrity check (C) Digital signatures (D) Image compression 27. : Which hash function is commonly used in Git for file integrity? (A) SHA-1 (B) SHA-256 (C) MD5 (D) CRC16 28. : Which output size does SHA-512 produce? (A) 128 bits (B) 256 bits (C) 384 bits (D) 512 bits 29. : What is the avalanche effect in hashing? (A) Minor input change causes major output change (B) Multiple inputs give identical outputs (C) Output remains constant (D) Easy reversibility 30. : Which is a non-cryptographic hash function? (A) MurmurHash (B) SHA-256 (C) SHA-3 (D) MD5 31. : Which property prevents attackers from predicting outputs? (A) Collision resistance (B) Avalanche effect (C) Pre-image resistance (D) Randomness 32. : Which of these is an outdated hash function vulnerable to attacks? (A) MD5 (B) SHA-3 (C) SHA-512 (D) SHA-256 33. : Which property ensures hash function is deterministic? (A) Same input always gives same output (B) Different inputs give different outputs (C) Input is unpredictable (D) Hash can be reversed 34. : Which hash function produces 224-bit output? (A) SHA-224 (B) SHA-256 (C) SHA-1 (D) SHA-3 35. : Which is the main use of salted hashes? (A) Prevent rainbow table attacks (B) Reduce storage size (C) Encrypt passwords (D) Generate signatures 36. : Which algorithm is designed for password hashing? (A) bcrypt (B) SHA-1 (C) MD5 (D) DES 37. : Which hash function is used in Ethereum? (A) SHA-256 (B) Keccak-256 (C) MD5 (D) Whirlpool 38. : Which property ensures hash functions resist second input attacks? (A) Second pre-image resistance (B) Avalanche effect (C) Reversibility (D) Key exchange 39. : Which is the hash function used in digital certificates (SSL/TLS)? (A) SHA-256 (B) AES (C) RSA (D) DES 40. : Which of these is the oldest hash function? (A) MD4 (B) SHA-2 (C) SHA-3 (D) Whirlpool 41. : Which application of hash function is used in data deduplication? (A) File integrity check (B) Block identification (C) Digital signatures (D) Encryption 42. : Which hash function supports variable-length output? (A) SHAKE (SHA-3 family) (B) SHA-256 (C) MD5 (D) CRC32 43. : Which technique improves password storage security? (A) Salting and hashing (B) Compression (C) Encryption only (D) File masking 44. : Which hash function is resistant against length extension attacks? (A) SHA-3 (B) SHA-1 (C) SHA-2 (D) MD5 45. : Which property prevents hash output prediction? (A) Entropy (B) Reversibility (C) Avalanche effect (D) Pre-image resistance 46. : Which algorithm is designed as a replacement for MD5 and SHA-1? (A) SHA-2 (B) SHA-3 (C) Whirlpool (D) Tiger 47. : Which hash function uses sponge construction? (A) Keccak (SHA-3) (B) SHA-1 (C) MD5 (D) SHA-2 48. : Which is the major risk of weak hash functions? (A) Collisions and attacks (B) Faster computation (C) High memory usage (D) Limited output size 49. : Which cryptographic attack exploits collisions in hash functions? (A) Birthday attack (B) Replay attack (C) Side-channel attack (D) Brute force attack 50. : Which hash algorithm is used in DNSSEC for domain authentication? (A) SHA-256 (B) MD5 (C) SHA-1 (D) AES