Cryptography and Network Security 1
Cryptography and Network Security 1
1. security attack
2. security mechanism
3. security service
4. All of these
a. Security parameters
b. Security services
c. Security attacks
d. Authentication protocol
a. Authentication
b. Access control
c. Non-Repudiation
d. Data intergrity
a. Data Authentication
b. Data Integrity
c. Authentication
d. Data Confidentiality
3. Passive capture of a data unit and its subsequent re-transmission to produce an unauthorized effect is known as______________________
attack.
a. Masquerade
b. Replay
d. Denial of Service
a. Data Authentication
b. Data Integrity
c. Authentication
d. Access control
a. Active
b. Passive
c. Not an
d. Active and Passive
a. Active
b. Passive
c. Not an Active nor Passive
d. Active as well as Passive
1. Replay
2. Release of message content
3. Denial of service
4. Man- in-Middle attack
10. What is Ciphertext of the plaintext “MIDSEMEXAM” if it is encrypted using Playfair cipher? Where the key is “QUARANTINE”.
a. WFKLIOAGLO
b. FWLKIOAGOL
c. WFLKLIOLOAG
d. FWKLAGLOIO
11. What will be the ciphertext of the plaintext is “GOODEVENING”, if it is encrypted using transposition cipher? Where key is “4 2 1 3”
a. Length of message
b. Total number of symbols used to code the message
c. Total number of symbols can be used to code any message
d. 26
a. Galois fields
b. Prime field
c. Graded function
d. Generator Field
a. 256 bytes
b. 16 X16 bits
c. 256 bits
d. 16 bytes
a. Main key
b. Main key and plaintext
c. Main key and S-box
d. S-box
a. 10/64/56
b. 16/64/56
c. 10/128/64
d. 16/64/128
a. 1
b. 0
c. 2
d. 5
23. __________________ is an assurance that the communicating entity is the one claim
1. Repudiation
2. Data integrity
3. Confidentiality
4. Authentication
25. __________ is protection against denial of transmission by one of the parties in a communication.
a. Data integrity
b. Authentication
c. Non-repudiation
d. Confidentiality
26. Passive capture of a data unit and its subsequent re-transmission to produce an unauthorized effect is known as______________________
attack.
a. Masquerade
b. Replay
d. Denial of Service
a. Replay
b. Masquerade
c. Modification of message
b. Replay
c. Masquerade
d. Both b & c
29. What is the cipher text of the message “meet me after the toga party” using transposition cipher with key 4312567
a. COIXTTNAAPTMTSUOAODWKNLYPETZ
b. AODW TTNAAPTMTSUOCOIXKNLYPETZ
c. APTMTTNATSUOAODWCOIXKNLYPETZ
d. TTNAAPTMTSUOAODWCOIXKNLYPETZ
30. If both sender and receiver use the same key, the system is referred to as__________
d. Block cipher
31. If different keys are used for encryption and decryption then the system is referred to as________ cipher.
a. Conventional
b. Block
c. Stream
d. Asymmetric
a. Playfair cipher
b. Monoalphabetic cipher
c. Polyalhpabetic cipher
33. In a playfair cipher designed using keyword MONARCHY (assume letter I and J are placed together). What is encryption of “yt”
a. QD
b. DQ
c. BS
d. HL
a. 56-bit
b. 64-bit
c. 128-bit
d. 256-bit
a. 12
b. 14
c. 16
d. 18
b. 32-bit
c. 48-bit
d. 64-bit
a. 56-bit
b. 128-bit
c. 256-bit
d. 512-bit
a. 4
b. 6
c. 8
d. 10
a. 21
b. 7
c. 3
d. 1
a. 2426
b. 2725
c. 2527
a. 235
b. 1841
c. 354
a. 843
b. 834
c. 384
43. Consider the set G={0,1,2,3,4,5,6,7} along with addition modulo 8 operation. What is inverse of 3 in this system
a. 1
b. 0
c. 2
d. 5
44. Consider the set G={0,1,2,3,4,5,6,7} along with multiplication modulo 8 operation. What is inverse of 7 in this system
a. 7
b. 1
c. 0
d. 6
45. Number of rounds in AES cipher can be_________
a. 8,10 and 12
b. 10,14 and 18
c. 10,12 and 14
d. 8,12 and16
a. 64-bit
b. 128-bit
c. 192-bit
d. 256-bit
a. 32-bit
b. 64-bit
c. 128-bit
d. 256-bit
a. 128-bit
b. 192-bit
c. 256-bit
d. 512-bit
a. 6
b. 4
c. 8
d. 10
a. 3
b. 4
c. 5
d. 6
a. 4
b. 3
c. 2
d. 1
a. 2
b. 3
c. 2 or 3
d. 1
a. DES
b. AES
c. Triple DES
d. Double DES
54. __________________ is an assurance that the communicating entity is the one claim
a. Repudiation
b. Data integrity
c. Confidentiality
d. Authentication
a. Replay
b. Masquerade
c. Modification of message
56. What is the cipher text of the message “meet me after the toga party” using transposition cipher with key 4312567
a. COIXTTNAAPTMTSUOAODWKNLYPETZ
b. AODW TTNAAPTMTSUOCOIXKNLYPETZ
c. APTMTTNATSUOAODWCOIXKNLYPETZ
d. TTNAAPTMTSUOAODWCOIXKNLYPETZ
a. Playfair cipher
b. Monoalphabetic cipher
c. Polyalhpabetic cipher
b. 32-bit
c. 48-bit
d. 64-bit
a. 4
b. 6
c. 8
d. 10
a. 2426
b. 2725
c. 2527
61. Consider the set G={0,1,2,3,4,5,6,7} along with addition modulo 8 operation. What is inverse of 3 in this system
a. 1
b. 0
c. 2
d. 5
a. 8,10 and 12
b. 10,14 and 18
c. 10,12 and 14
d. 8,12 and16
a. 128-bit
b. 192-bit
c. 256-bit
d. 512-bit
3. Counter mode
a. Block Cipher
b. Stream cipher
c. Transposition cipher
d. All of above
1. Randomness
2. Unpredictability
4. Uniform distribution
67. Log (10) =
2,19
a. 17
b. 18
c. 13
d. 2
68. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the
plaintext M?
a. 4
b. 3
c. 5
d. None of these
69. Which of the following algorithms are used for Authentication, Key exchange as well as Encryption/decryption
1. RSA
2. ECC
4. DH key exchange
70. Which of the following algorithms are used for Authentication, Key exchange as well as Encryption/decryption
a. RSA
b. ECC
d. DH key exchange
71. Users A and B use the Diffie-Hellman key exchange technique with a common prime q = 71 and a primitive root a = 4. If user A
has private key XA = 5, If user B has private key XB = 3. What is the shared secret key?
a. 20
b. 30
c. 64
d. 3
72. Which asymmetric algorithm provides better security if key size is restricted to 512 bit
c. RSA
d. ElGamal
c. Both a and b
d. None of these
c. Counter mode
75. Encrypting/decrypting blocks of size less than 64 bit using DES is possible using _______ mode
3. Counter mode
76. Encryption (or decryption) in _____ mode can be done in parallel on multiple blocks of plaintext or ciphertext
2. Cipher Feedback
3. Counter mode
4. Output Feedback
a. 1 to 256 bits
b. 8 to 1024bits
c. 1 to 256 bytes
d. 64 to 128 bits
a. Block Cipher
b. Stream cipher
c. Transposition cipher
d. All of above
a. random permutation
b. swap
c. XOR
d. All of above
a. Randomness
b. Unpredictability
d. Uniform distribution
a. DES
b. AES
c. Triple DES
d. RC4
a. Bits
b. Bytes
c. Both
d. None of these
b. The number of positive integers less than or equal to n and relatively prime to n
d. None of these
e. 18
e. 13
e. 2
a. 130
b. 143
c. 120
d. 100
a. 1
b. a
c. a+1
d. 2a
a. 1
b. 13
c. 5
d. 3
89. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the
plaintext M?
a. 4
b. 3
c. 5
d. None of these
90. In a public-key system using RSA, you intercept the Plaintext P = 15 sent to a user whose public key is e = 7, n = 65 . What are values
of private keys?
1. {7, 5,13}
2. {5,13}
3. {7, 13}
4. None of these
1. Authentication
2. Key exchange
3. Encryption/decryption
4. All of these
92. Which of the following algorithms are used for Authentication, Key exchange as well as Encryption/decryption
a. RSA
b. ECC
1. Message is encrypted using senders private key and decrypted using senders public key
2. Message is encrypted using senders private key and decrypted using receivers public key
3. Message is encrypted using receivers public key and decrypted using receivers private key
4. Message is encrypted using receivers private key and decrypted using receivers public key
1. Message is encrypted using senders private key and decrypted using senders public key
2. Message is encrypted using senders private key and decrypted using receivers public key
3. Message is encrypted using receivers public key and decrypted using receivers private key
4. Message is encrypted using receivers private key and decrypted using receivers public key
4. Key exchange.
3. To prove to another party that one holds a secret key without revealing it
98. Users A and B use the Diffie-Hellman key exchange technique with a common prime q = 71 and a primitive root a = 7. If user A has
private key XA = 5, If user B has private key XB = 12.What is the shared secret key?
a. 30
b. 50
c. 21
d. 51
99. Users A and B use the Diffie-Hellman key exchange technique with a common prime q = 71 and a primitive root a = 4. If user A has
private key XA = 5, If user B has private key XB = 3 What is the shared secret key?
a. 20
b. 30
c. 64
d. 3
a. RSA
b. ElGamal
101. Which asymmetric algorithm provides better security if key size is restricted to 512 bit
c. RSA
d. ElGamal
c. Both a and b
d. None of these
4. None of these
105. In which of the following mode(s) each plain text block is encrypted independently
c. Counter mode
d. both Electronic Codebook and Counter mode
106. In which of the following mode(s) the algorithm must complete the computation on one block before beginning on the next block
d. None of these
107. In which of the following mode if the same b-bit block of plaintext appears more than once in the message, it always produces the
same ciphertext.
c. Counter mode
a. RC 4 is a block cipher
d. None of these
a. 256 bits
b. 2048 bits
c. 128 bits
d. 512 bits
b. false
a. AES
b. DES
c. Hash
d. None of these
a. RSA
b. AES
c. Triple DES
d. RC 4
a. 24
b. 38
c. 20
d. None of these
a. 36
b. 56
c. 50
d. None of these
a. 5
b. 10
c. 6
d. 9
a. 3
b. 4
c. 5
d. 6
121. In public-key cryptography the message encrypted using sender’s private key
122. In public-key cryptography the message encrypted using receiver’s public key
d. All of these
124. In RSA if public key of a user is {7, 33}. What is this user’s private key?
a. 3
b. 4
c. 5
d. 6
125. In RSA if public key of a user is {3, 55}. What is this user’s private key?
a. 27
b. 11
c. 13
126. In RSA if p=7, q=11, e=17 then what is cipher text of M=8?
a. 57
b. 8
c. 32
d. None of these
127. In RSA if p=5, q=11, e=3 then what is cipher text of M=19?
a. 39
b. 50
c. 42
d. None of these
a. Encryption
b. Digital signature
d. none of these
d. none of these
130. The two global public parameters of Diffie-Hellman are q and α. What is α?
a. prime number
b. prime factor of q
c. primitive root of q
d. random integer
a. true
b. false
a. true
b. false
133. In ElGamal cryptosystem it is possible to have different cipher text for same plaintext without changing the encryption key.
a. true
b. false
134) Which of the following statement is/are true about hash functions?
i. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M)
ii. Hash functions are used in message authentication and digital signature
135) The SHA-512 algorithm takes as input a message with a maximum length of less than _____bits and produces as output a 512-bit
message digest.
1. The signature must be a bit pattern that depends on the message being signed.
2. The signature must use some information unique to the sender
3. It must be relatively easy to produce the digital signature.
4. All of these
138) Which of the following is/are type(s) of intruders?
1. Masquerader
2. Misfeasor
3. Clandestine user
4. All of these
139) Which of the following is/are technique(s) for the distribution of public keys?
1. Public announcement
3. Public-key certificates
4. All of these
142) In PGP, for message encryption which of the following cannot be used?
a. CAST
b. Blowfish
c. Three key Triple DES
d. IDEA
143) A _____ is a program that can replicate itself and send copies from computer to computer across network connections.
a. Virus
b. Worm
c. Trojan horse
d. Logic bomb
144) _______ are decoy systems that are designed to lure a potential attacker away from critical systems.
1. Honeypots
2. Audit record
3. Markov process
4. Gauge
145) In PGP for achieving E-mail compatibility which of the following is used?
a. Radix 64 conversion
b. ZIP
c. CAST
d. IDEA
146) In SHA-512 each message block is processed by a compression function consisting of ______ rounds (steps).
a. 16
b. 64
c. 80
d. 128
147) Which of the following is/are elements of Public Key Infrastructure?
1. Certification Authority
2. Registration Authority
3. CRL issuer
4. All of these
148) Which of the following is/are reason(s) to revoke a user’s certificate?
1. The user’s private key is assumed to be compromised.
2. The user is no longer certified by this CA.
3. The CA’s certificate is assumed to be compromised.
4. All of these
149) A _____ is a apparently useful program containing hidden code that, when invoked, performs some unwanted or harmful function.
a. Trojan horse
b. Stealth virus
c. Boot sector virus
d. Logic bomb
150) Which of the following is a type of firewalls?
a. Packet filters
b. Application-level gateways
c. Circuit-level gateways
d. All of these