Ics 3
Ics 3
a. Cipher management
b.Key combination
c.Key management
d.none of above
a. p
b. q
c. n
d. r
5 In symmetric key cryptography, key used by sender and a
receiver is
a. shared
b. different
c. two keys are used
d. none
6 RSA stands for: a
a. DES.
b. Triple DES.
c. DH.
d. RSA.
9 In MD5 Message Digest Algorithm takes an input of b
arbitrary length and ________ message digest is
produced.
a. 64 bits
b. 128 bits
c. 160 bits
d. 256 bits
10 The input message in MD5 algorithm is produced in d
______
a. 64 bits
b. 128 bits
c. 160 bits
d. 256 bits
12 The man-in-the-middle attack can endanger the security of a
the Diffie Hellman method if two parties are not
a. Authenticated
b. Joined
c. Submit
d. Separate
13 Function provided by key storage d
a. Operational Storage
b. Backup Storage
c. Archive Storage
d. All of above
14 ECC stands for a
a. 256 bits
b. 128 bits
c. 512 bits
d. 160 bits
16 In which attack original data gets modified and new b
malicious code is retransmitted again and again to receiver
a. Masquerade Attack
b. Replay attack (Rewrite)
c. Non Repudiation
d. Traffic Analysis
17 Which of the following is not a Authentication method d
a. Hash function
b. Message encryption
c. Message Authentication Code (MAC)
d. Key Generation
18 Which algorithm uses big-endian method to represent the a
message
a. SHA-1
b. MD5
c. Both a and b
d. None of above
19 Which algorithm uses little-endian method to represent b
the message
a. SHA-1
b. MD5
c. Both a and b
d. None of above
20 SHA has how many rounds c
a. 64
b. 4
c. 20
d. 10
21 What is used instead of passwords during login session b
and then can be used in any Kerberos services
a. Key
b. Tickets
c. Header
d. Certificate
22 What will be the value of n according to RSA algorithm if b
the two prime number a and b are given has 3 and 5
a. 8
b. 15
c. 2
d. 3
23 The attack which in which Hacker tries all possible a
private keys is known as
a. 3
b. 15
c. 9
d. 12
1) Diffie-Hellman
2) RSA
3) DES
4) AES