CNS Objective QB With Ans
CNS Objective QB With Ans
UNIT-1
1. Interception is ---------------
a) security service b) security attack c) security mechanism d) security strip
2. Interruption is attack on----------------
a) norepudiation b) availability c) authentication d) confidentiality
3. Fabrication is attack on----------------
a). nonrepudiation b) availability c) authentication d) confidentiality
4. Expansion of C2B is--------
a) customer to branch b) branch to customer
c) customer tobusuiness d) two way of branch and customer
5. Odd man out
a) interruption b)interception c)modification d) fabrication
6. -------------- attack is capturing authorization privileges and used them later.
a).modification b) masquerade c) replay d)denial of service
7. Cutting of communication line is an example of -------------------
a)interruption b) interception c)modification d) fabrication
8. which of the following integrity is not valid category of integrity
a) connection integrity b) connectionless integrity
c) field integrity d) field less integrity
9. Security service ---------- is requires that neither the sender nr the receiver of a message
be able to deny the transmission.
a) nonrepudiation b) availability c) authentication d) confidentiality
10. Vernam cipher is also called
a)rail fence b)one time pad c)book cipher d)running key cipher
11. DOS attacks are caused by
a)authentication b)alteration c)fabrication d)replay attacks
12. The process of writing the text as diagonals and reading it as a sequence of rows is
known as
a)rail fence b)caesar cipher c)mono alphabetic d) vernam cipher
13. ------------is a technique that facilitates hiding of a message that is to be kept secret inside
other messages
steganography
14. Science and art of developing cryptosystems is known as------------ cryptography
15.------------is the scrambled message or data that is generated as output by encryption
algorithm cipher text
16. --------- attack take place when one entity pretends to different entitymasquerade
17.-----------ensures that only authorized parties are able to modify computer system data
and transmitted informationintegrity
18. A process which is designed to detect, prevent or recover from an attack is known as ------
Security mechanism
19.------------means identifying origin of message correctly and it should ensures that
identity is not false authentication
20. Any action that compromises the security of data which is owned by an organization is
known as -----------------security attack
UNIT II
(a) 128 bits (b) 164 bits (c) 64 bits (d) 156 bits
8.Each S-box takes 6 bits input and produces ---- bits as output.
11. In general private key encryption algorithms uses ----- no. of keys.1
12. Public key encryption algorithm uses ---- no. of keys .2
13. RSA algorithm was developed by---------rivest Shamir adleman
14. IDEA stands for---------international data encryption algorithm
15. CBC stands for -------------- cipher block chaining
16. DES encrypts blocks of ---------- bits64
17. AES requires ------------- no of bits for plain text 128
18. No of S- boxes used in Blowfish algorithm is ----------- 4
19. There are ----------rounds in Blowfish 16
20. In -------------one block of plain text is encrypted at a time block cipher
UNIT III
1.Kerberos is ----------service designed for use in a distributed environment
a)integrity b) confidentiality c) authentication d) availability
2. -------- is a message digest algorithm
a) DES b)IDEA c) MD5 d) RSA
3. When a hash function is used to provide message authentication, the hash function
value is reffered to as ----
a) message digest b) message field c) message score d) message leap
4. X.509 scheme is -----certificate
a) Private key b) public key c) symmetric key d) none
5. MAC is also called-----
a)Cryptographic checksum b) fingerprint c) message digest d) all the above
6. Hash function can be applied to a block of ----
a) fixed size b) variable size c) 512 bytes d) 1024 bytes
7. SHA -512 uses -----registers
a) 8 b) 6 c) 4 d)5
8. SHA follows --- format to store values
a) littleenidian b) big enidian c) both a & b d) none
9.Number of steps in SHA-512-------
a) 60 b)70 c)80 d) 40
10.Kerberos makes use of ------ algorithm
a) RSA b)DES c) Blowfish d) IDEA
11. SHA represents--------------secure hash algorithm
12. Each block size of SHA -512 is ------------128 bit
13. SHA -512 algorithm outputs -----------bit message digest512 bit
14. TGS stands for-------------------ticket granting server
15. A ------------- can issue digital certificatescertificate authority
16. The ------------standard defines the structure of a digital certificateigital signature
standard
17. A full service Kerberos environment is called as-----------realm
18. HMAC stands for---------------hash message authentication code
19. There are -------number of versions in x.5093
20.Version 4 of Kerberos uses --------------encryption modecipher block chaining
UNIT IV
UNIT-V