0% found this document useful (0 votes)
21 views17 pages

Answer: A) Public Key and Private Key

Uploaded by

sridharan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views17 pages

Answer: A) Public Key and Private Key

Uploaded by

sridharan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

1. In RSA, what are the two keys used for encryption and decryption?

a) Public key and Private key b) Symmetric key and Asymmetric key
c) Encryption key and Decryption key d) Hash key and Signing key
Answer: a) Public key and Private key
2. In RSA, what is the role of the totient function (φ(n))?
a) To generate the public and private key pairs
b) To determine the value of the modulus
c) To calculate the modular inverse of the public exponent
d) To encrypt the message
Answer: c) To calculate the modular inverse of the public exponent
3. What is the purpose of padding in RSA encryption?
a) To increase the key size b) To prevent ciphertext attacks
c) To ensure that the message fits the block size d) To make the plaintext
length uniform
Answer: b) To prevent ciphertext attacks
4. Which of the following best describes the "modulus" in RSA encryption?
a) The exponent used in encryption and decryption b) The product of two
prime numbers
c) The key used to hash the plaintext d) The result of encrypting the message
Answer: b) The product of two prime numbers
5. What is the significance of the private key 'd' in RSA?
a) It is used to encrypt the plaintext b) It is used to decrypt the ciphertext
c) It is shared with everyone to verify signatures d) It is used to generate the
public key
Answer: b) It is used to decrypt the ciphertext
6. What is the primary goal of key management in cryptography?
a) To encrypt data efficiently b) To securely store and handle cryptographic
keys
c) To generate random numbers for encryption d) To compress encrypted
data
Answer: b) To securely store and handle cryptographic keys
7. Which key management practice helps ensure that keys are only accessible
by authorized users?
a) Key Distribution b) Key Escrow c) Access Control and Authentication
d) Key Generation
Answer: c) Access Control and Authentication
8. Which of the following is a common method for secure key storage?
a) Encrypting keys with a symmetric key algorithm
b) Storing keys in plaintext on disk
c) Using a database with no encryption
d) Writing keys on paper
Answer: a) Encrypting keys with a symmetric key algorithm
9. What is a key distribution center (KDC) used for?
a) To manage user authentication b) To encrypt and decrypt messages
c) To generate and distribute symmetric keys securely
d) To store cryptographic keys in a database
Answer: c) To generate and distribute symmetric keys securely
10. What is the primary purpose of the Diffie-Hellman key exchange protocol?
a) To encrypt data b) To establish a shared secret key over an insecure
channel
c) To authenticate users d) To generate random keys
Answer: b) To establish a shared secret key over an insecure channel
11. Which of the following is true about the Diffie-Hellman protocol?
a) It provides authentication of parties b) It ensures non-repudiation
c) It allows for secure key exchange but does not provide authentication
d) It is resistant to all types of attacks
Answer: c) It allows for secure key exchange but does not provide
authentication
12. What type of cryptographic algorithm is Diffie-Hellman classified as?
a) Asymmetric key algorithm b) Symmetric key algorithm
c) Hash function d) Digital signature algorithm
Answer: a) Asymmetric key algorithm
13. What does the term "session key" refer to in the context of the Diffie-
Hellman key exchange?
a) A key used to authenticate the parties
b) A key used to encrypt communication for a particular session
c) A key that remains constant for all sessions
d) A key used to encrypt the Diffie-Hellman public keys
Answer: b) A key used to encrypt communication for a particular
session
14. What is a "public key" in the Diffie-Hellman key exchange?
a) A key that is used to encrypt messages
b) A key that is kept secret and used to decrypt messages
c) A key that is generated from a private key and shared publicly
d) A key used to sign messages
Answer: c) A key that is generated from a private key and shared
publicly
15. Which of the following is a common use of ECC in cryptographic systems?
a) Hashing passwords b) Generating symmetric keys for encryption
c) Digital signatures and key exchange d) Compressing data
Answer: c) Digital signatures and key exchange
16. What is the purpose of the "public key" in ECC?
a) To encrypt data b) To authenticate users
c) To verify digital signatures and establish secure communication
d) To store sensitive information securely
Answer: c) To verify digital signatures and establish secure
communication
17. Which of the following protocols uses ECC for secure key exchange?
a) RSA b) Diffie-Hellman
c) Elliptic Curve Diffie-Hellman (ECDH) d) Digital Signature Algorithm (DSA)
Answer: c) Elliptic Curve Diffie-Hellman (ECDH)
18. Which of the following is a property of elliptic curves used in ECC?
a) They are linear functions b) They form a group under elliptic curve
addition
c) They have no defined operations d) They are used for hashing algorithms
Answer: b) They form a group under elliptic curve addition
19. Which of the following is a commonly used technique for message
authentication?
a) Symmetric encryption b) Hash functions
c) Public key encryption d) Key exchange protocols
Answer: b) Hash functions
20. Which of the following algorithms is commonly used for generating a
Message Authentication Code (MAC)?
a) SHA-256 b) AES c) MD5 d) HMAC-SHA1
Answer: d) HMAC-SHA1
21. What type of cryptographic key is used in a MAC?
a) Public key b) Private key c) Symmetric key d) Asymmetric key
Answer: c) Symmetric key
22. What is the primary purpose of a cryptographic hash function?
a) To encrypt data for confidentiality
b) To generate a fixed-size output from variable-size input
c) To compress data before transmission d) To manage symmetric keys
Answer: b) To generate a fixed-size output from variable-size input
23. What is the output size of the SHA-256 hash function?
a) 128 bits b) 160 bits c) 256 bits d) 512 bits
Answer: c) 256 bits
24. Which hash function produces a 128-bit hash value?
a) SHA-256 b) SHA-512 c) MD5 d) SHA-1
Answer: c) MD5
25. Which of the following is NOT a common use of hash functions?
a) Encrypting data for secure communication b) Generating digital signatures
c) Verifying data integrity d) Storing passwords securely
Answer: a) Encrypting data for secure communication
26. In hash functions, what is the term for the process of converting input data
into a fixed-size hash value?
a) Encryption b) Compression c) Hashing d) Decryption
Answer: c) Hashing
27. What is the primary purpose of a digital signature in cryptography?
a) To encrypt data for confidentiality
b) To verify the authenticity and integrity of a message
c) To compress data before transmission
d) To manage symmetric keys
Answer: b) To verify the authenticity and integrity of a message
28. Which of the following algorithms is commonly used for creating digital
signatures?
a) DES b) RSA c) MD5 d) SHA-3
Answer: b) RSA
29. Which of the following is NOT a property of a secure digital signature?
a) Non-repudiation b) Integrity c) Confidentiality d) Authenticity
Answer: c) Confidentiality
30. In which step of the digital signature process is the public key used?
a) To encrypt the message b) To generate the hash value
c) To verify the digital signature d) To generate the digital signature
Answer: c) To verify the digital signature
31. What is the purpose of the private key in digital signature schemes?
a) To encrypt the message b) To sign the hash value of the message
c) To verify the digital signature d) To generate the public key
Answer: b) To sign the hash value of the message
32. Which of the following is a key characteristic of a digital signature?
a) It is a form of symmetric encryption b) It is a form of asymmetric
encryption
c) It ensures confidentiality of the message
d) It ensures that the message can be decrypted by anyone
Answer: b) It is a form of asymmetric encryption
33. What is the primary purpose of an authentication protocol?
a) To encrypt data for confidentiality b) To verify the identity of users or
systems
c) To generate cryptographic keys d) To compress data for storage
Answer: b) To verify the identity of users or systems
34. Which of the following algorithms is an example of a public key
cryptosystem?
a) AES b) DES c) RSA d) RC4
Answer: c) RSA
35. In a public key cryptosystem, what is the role of the public key?
a) To decrypt messages b) To encrypt messages
c) To generate the private key d) To verify digital signatures
Answer: b) To encrypt messages
36. Which component of a public key cryptosystem is used to ensure the
authenticity of the sender?
a) Public key b) Private key c) Digital signature d) Hash function
Answer: c) Digital signature
37. In the context of modular arithmetic, what does the term "modulus" refer
to?
a) The integer value by which numbers are divided
b) The result of a division operation
c) The maximum value of a number in a given system
d) The smallest integer that is congruent to zero in a modular system
Answer: a) The integer value by which numbers are divided
38. What is the purpose of the Extended Euclidean Algorithm in cryptography?
a) To find the greatest common divisor (GCD) of two integers
b) To encrypt messages using a symmetric key
c) To solve systems of linear equations
d) To compute the discrete logarithm
Answer: a) To find the greatest common divisor (GCD) of two integers
39. Which of the following algorithms is used to compute the modular inverse
of an integer?
a) Euclidean Algorithm b) Extended Euclidean Algorithm
c) Sieve of Eratosthenes d) Chinese Remainder Theorem
Answer: b) Extended Euclidean Algorithm
40. In elliptic curve cryptography (ECC), what is the primary mathematical
structure used?
a) Prime fields b) Elliptic curves over finite fields
c) Complex numbers d) Binary trees
Answer: b) Elliptic curves over finite fields
Unit -III
1. What is the primary purpose of the Kerberos protocol?
a) To provide end-to-end encryption
b) To authenticate users in a networked environment
c) To manage public key infrastructure
d) To perform secure email communication
Answer: b) To authenticate users in a networked environment
2. Which cryptographic algorithm is commonly used in Kerberos for encrypting
tickets?
a) RSA b) AES c) DES d) SHA-256
Answer: c) DES
3. Which component of Kerberos is responsible for issuing tickets and session
keys?
a) Key Distribution Center (KDC) b) Authentication Server (AS)
c) Ticket Granting Server (TGS) d) Network Server
Answer: a) Key Distribution Center (KDC)
4. What is the role of the Authentication Server (AS) in Kerberos?
a) To issue tickets for accessing network resources
b) To validate user credentials and issue a Ticket Granting Ticket (TGT)
c) To manage public key infrastructure
d) To provide end-to-end encryption for network communication
Answer: b) To validate user credentials and issue a Ticket Granting
Ticket (TGT)
5. What does the Ticket Granting Ticket (TGT) allow a user to do in Kerberos?
a) Access network resources directly b) Encrypt data for secure
transmission
c) Request additional tickets from the Ticket Granting Server (TGS)
d) Authenticate other users
Answer: c) Request additional tickets from the Ticket Granting Server
(TGS)
6. In Kerberos, what is the purpose of the Ticket Granting Server (TGS)?
a) To authenticate user credentials and issue a TGT
b) To issue tickets for accessing specific network services
c) To manage session keys for secure communication
d) To validate public key certificates
Answer: b) To issue tickets for accessing specific network services
7. Which protocol provides the basis for Kerberos’ authentication mechanism?
a) Public Key Infrastructure (PKI) b) Challenge-Response Protocol
c) Secret-Key Cryptography d) Digital Signatures
Answer: b) Challenge-Response Protocol
8. What type of encryption is used to protect the TGT in Kerberos?
a) Asymmetric encryption b) Hash-based encryption
c) Symmetric encryption d) Public-key encryption
Answer: c) Symmetric encryption
9. What is the primary purpose of an X.509 certificate?
a) To encrypt data transmitted over a network
b) To provide authentication and secure communication
c) To manage network access control d) To provide a backup of user data
Answer: b) To provide authentication and secure communication
10. Which organization defines the X.509 standard?
a) Internet Engineering Task Force (IETF)
b) International Organization for Standardization (ISO)
c) Institute of Electrical and Electronics Engineers (IEEE)
d) International Telecommunication Union (ITU)
Answer: d) International Telecommunication Union (ITU)
11. What type of key is typically included in an X.509 certificate?
a) Symmetric key b) Asymmetric key pair (public and private keys)
c) Session key d) Hash key
Answer: b) Asymmetric key pair (public and private keys)
12. Which field in an X.509 certificate identifies the certificate authority (CA)
that issued the certificate?
a) Subject Name b) Issuer Name c) Serial Number d) Public Key
Answer: b) Issuer Name
13. Which part of an X.509 certificate contains information about the validity
period of the certificate?
a) Subject Name b) Issuer Name c) Validity Period d) Public Key
Answer: c) Validity Period
14. What is the purpose of the "Serial Number" field in an X.509 certificate?
a) To uniquely identify the certificate issued by a CA
b) To list the cryptographic algorithms used
c) To specify the certificate's validity period
d) To store the certificate's public key
Answer: a) To uniquely identify the certificate issued by a CA
15. Which algorithm is commonly used to sign X.509 certificates?
a) RSA b) AES c) SHA-256 d) DES
Answer: a) RSA
16. Which standard specifies the format for X.509 certificates?
a) ISO/IEC 27001 b) RFC 5280 c) ITU-T X.500 d) IEEE 802.11
Answer: b) RFC 5280
17. What is the primary purpose of email encryption?
a) To prevent unauthorized access to email content b) To compress email
attachments
c) To provide a backup of email data d) To manage email storage
Answer: a) To prevent unauthorized access to email content
18. Which protocol is commonly used for encrypting email messages in transit?
a) SMTP b) IMAP c) TLS/SSL d) POP3
Answer: c) TLS/SSL
19. Which protocol is commonly used to securely retrieve email messages
from a mail server?
a) SMTP b) IMAP c) HTTP d) FTP
Answer: b) IMAP
20. Which technology can be used to encrypt email messages end-to-end?
a) TLS b) SSL c) S/MIME d) IMAP
Answer: c) S/MIME
21. What does PGP stand for?
a) Pretty Good Privacy b) Pretty Great Protection
c) Public Good Privacy d) Personal Good Protection
Answer: a) Pretty Good Privacy
22. Which type of encryption does PGP primarily use for securing emails?
a) Symmetric encryption b) Asymmetric encryption
c) Both symmetric and asymmetric encryption d) Hashing only
Answer: c) Both symmetric and asymmetric encryption
23. What is the purpose of the public key in PGP?
a) To decrypt messages b) To encrypt messages
c) To sign messages d) To verify signatures
Answer: b) To encrypt messages
24. What is the purpose of the private key in PGP?
a) To encrypt messages b) To decrypt messages
c) To sign messages d) To verify signatures
Answer: B) To decrypt messages
25. In PGP, what does the digital signature ensure?
a) Message integrity b) Confidentiality c) Non-repudiation d) All of the
above
Answer: d) All of the above
26. What role does a key pair play in PGP?
a) They are used to hash the message b) They are used to encrypt and
decrypt messages
c) They are used to sign and verify messages d) Both B and C
Answer: d) Both B and C
27. Which key is used to verify a digital signature in PGP?
a) Public key of the sender b) Private key of the sender
c) Public key of the receiver d) Private key of the receiver
Answer: a) Public key of the sender
28. What does PGP use to protect the integrity of the message?
a) Encryption b) Hashing c) Compression d) Decryption
Answer: B) Hashing
29. PGP was originally developed by:
a) Phil Zimmermann b) Bruce Schneier c) Whitfield Diffie d) Ronald Rivest
Answer: a) Phil Zimmermann
30. Which type of key is used to encrypt the session key in PGP?
a) Private key b) Public key c) Symmetric key d) Hash key
Answer: B) Public key
31. What does S/MIME stand for?
a) Secure/Multi-purpose Internet Mail Extensions
b) Secure/Multipurpose Internet Mail Extensions
c) Secure/Multi-user Internet Mail Encryption
d) Secure/Multi-functional Internet Mail Extensions
Answer: b) Secure/Multipurpose Internet Mail Extensions
32. What is the primary purpose of S/MIME?
a) To provide email encryption and digital signatures b) To manage email
addresses
c) To increase email transmission speed d) To filter spam emails
Answer: a) To provide email encryption and digital signatures
33. What is used to verify the authenticity of an S/MIME message?
a) Symmetric key b) Digital signature c) Hash function d) Encryption
algorithm
Answer: b) Digital signature
34. In S/MIME, which key is used to encrypt the session key?
a) Sender’s public key b) Recipient’s public key
c) Sender’s private key d) Recipient’s private key
Answer: b) Recipient’s public key
35. Which standard does S/MIME use for encryption and signing?
a) X.509 b) PKCS #12 c) X.500 d) S/MIME v3
Answer: a) X.509
36. What is the purpose of the ‘encryption algorithm’ in S/MIME?
a) To ensure message integrity b) To secure the email contents
c) To verify digital signatures d) To issue certificates
Answer: b) To secure the email contents
37. What does IPsec stand for?
a) Internet Protocol Security b) Internet Privacy Security
c) Internal Protocol Security d) Integrated Protocol Security
Answer: a) Internet Protocol Security
38. What is a common method used for key exchange in IPsec?
a) IPsec Key Exchange Protocol b) Internet Key Exchange (IKE)
c) Secure Sockets Layer (SSL) d) Transport Layer Security (TLS)
Answer: b) Internet Key Exchange (IKE)
39. What encryption algorithms are commonly used with IPsec?
a) AES and DES b) RSA and SHA c) MD5 and SHA-1 d) RSA and
Blowfish
Answer: a) AES and DES
40. Which IP policy involves translating private IP addresses to public IP
addresses?
a) Static NAT b) Dynamic NAT c) Port Address Translation (PAT) d) All of the
above
Answer: d) All of the above

1. kerberos components
2. internet mail architecture
3. email protocol
4. s/mime messages
5. ip security policy

1. kerbeos overview
2. x.509 certificate
3. pgp
4. s/mime
5. ip security overview
Unit – IV
1. What does SSL stand for?
a) Secure Socket Layer b) Secure System Layer
c) Secure Service Layer d) Safety Socket Layer
Answer: a) Secure Socket Layer
What is the primary purpose of SSL?
a) To authenticate users b) To encrypt data transmitted over a network
c) To provide high-speed data transfer d) To manage network traffic
Answer: b) To encrypt data transmitted over a network
3. In SSL/TLS, what is used to verify the identity of a server?
a) Encryption algorithms b) Certificates c) Session keys d) Hash functions
Answer: b) Certificates
4. Which cryptographic technique is used in SSL/TLS to ensure data integrity?
a) Symmetric encryption b) Asymmetric encryption c) Hashing d)
Steganography
Answer: c) Hashing
5. Which of the following is NOT a version of SSL?
a) SSL 1.0 b) SSL 2.0 c) SSL 3.0 d) SSL 4.0
Answer: d) SSL 4.0
6. Which key pair is used to decrypt data encrypted with the public key in
SSL/TLS?
a) Public key b) Private key c) Session key d) Hash key
Answer: b) Private key
7. What does SSL use to ensure the authenticity of a website?
a) Passwords b) Digital certificates c) Cookies d) IP addresses
Answer: b) Digital certificates
Intruders
Malicious programs
Types of firewall
TLS
Intruder Detection

SSL
VIRUSes
password management
SET
Firewall design principle

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy