adplus-dvertising
frame-decoration

Question

What is cipher-block chaining ?

a.

Data is logically ‘ANDed’ with previous block

b.

Data is logically ‘ORed’ with previous block

c.

Data is logically ‘XORed’ with previous block

d.

None of the mentioned

Posted under Operating System

Answer: (c).Data is logically ‘XORed’ with previous block

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What is cipher-block chaining ?

Similar Questions

Discover Related MCQs

Q. What is not an encryption standard ?

Q. Which of following is not a stream cipher?

Q. What is a Hash Function ?

Q. MD5 produces __ bits hash data.

Q. SHA-1 produces __ bit of hash.

Q. Which two of the following are authentication algorithms ?

Q. What is role of Key Distribution Center ?

Q. In domain structure what is Access-right equal to ?

Q. What is meaning of right-set ?

Q. What is Domain ?

Q. What does access matrix represent ?

Q. What are the three additional operations to change the contents of the access-matrix ?

Q. Who can add new rights and remove some rights ?

Q. What are the three copy rights ?

Q. Which two rights allow a process to change the entries in a column ?

Q. Which is an unsolvable problem in access-matrix ?

Q. Which of the following objects require protection ?

Q. What is ‘separation’ in security of Operating systems ?

Q. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical sepration – In which processes conceal their data and computations

Q. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Temporal separation – in which process having different security requirement at different times
iii) Physical separation – In which users operate under illusion that no other processes exist
iv) Temporal sepration – In which processes conceal their data and computations