MCQ Cns
MCQ Cns
MCQ Cns
Unit-1 MCQ’s
A) encryption
B) decryption
Ans: B
A) ciphertext
B) plaintext
C) secret-text
Ans: A
A) encryption
B) decryption
Ans: A
A) substitution
B) transposition
Ans: A
A) ciphertext
B) plaintext
C) secret-text
Ans: B
A) private
B) public
C) either a or b
Ans: A
7. In a(n) ________ cipher, the same key is used by both the sender and receiver.
A) symmetric-key
B) asymmetric-key
Ans: A
8. _________ ciphers can be categorized into two broad categories: monoalphabetic and
polyalphabetic.
A) Substitution
B) Transposition
Ans: A
A) private
B) public
Ans: B
A) symmetric-key
B) asymmetric-key
Ans: B
11: The _______ is a number or a set of numbers on which the cipher operates.
A) cipher
B) secret
C) key
Ans: C
A) symmetric-key
B) asymmetric-key
Ans: A
13. Message _______Means that the sender and the receiver expect privacy
A. confidentiality
B. integrity
C. authentication
Ans: A
14. Message _________means that the data must arrive at the receiver exactly as sent
A. confidentiality
B. integrity
C. authentication
Ans: B
15. _________means that a sender must not be able to deny sending a message that
he sent.
A. Confidentiality
B. Integrity
C. Authentication
D. Non repudiation
Ans: D
A. message digest
B. message summary
C. encrypted message
D. none of the above
Ans: A
A. encryption
B. decryption
C. hash
Ans: C
A. two
B. three
C. four
Ans: B
A. conventional; digital
B. digital; digital
Ans:A
A. authentication
B. nonrepudiation
Ans: C
A. integrity
B. confidentiality
C. non repudiation
D. authentication
Ans: B
22: If____is needed, a cryptosystem must be application scheme over the scheme.
A. integrity
B. confidentiality
C. nonrepudiation
D. authentication
Ans:B
A. symmetric-key
B. asymmetric-key
Ans: B
A. something know
B. something possessed
C. something inherent
D. all of the above
Ans: D
Answer A
26. A sender must not be able to deny sending a message that he or she, in fact, did
send, is known as
A.Message Nonrepudiation.
B.Message Integrity.
C.Message Confidentiality.
D.Message Sending.
Answer A
27. When data must arrive at receiver exactly as they were sent, its called
A.Message Confidentiality.
B.Message Integrity.
C.Message Splashing.
D.Message Sending.
Answer B
28. Message must be encrypted at sender site and decrypted at the
A.Sender Site.
B.Site.
C.Receiver site.
D.Conferencing.
Answer C
A.Efficient network.
B.intranet.
C.protocols.
D.None of Above.
Answer A
A. Cryptography
B. Encryption
C. Cryptanalysis
D. Digital Signature
ANSWER: C
ANSWER: A
ANSWER: C
33: A Hidden Software which enters unauthorized manner and modifies the data is referred as ___
A. Computer Virus
B. Message Digest
C. Firewall
D. HMAC
ANSWER: A
34: Which of the following is/are methods of providing secure communication between two entities through the
use of mathematical coding?
ANSWER: B
ANSWER: B
A. confusion
B. diffusion
ANSWER: B
A. scanned signature
C. encrypting information
D. handwritten signature
ANSWER: C
a. Pre-Image Resistance
b. Compression
c. Fixed Length Output
d. None of the above
39. Which of the following security services cannot be achieved using the Hash
functions?
OR
Which of the following is not possible through hash value?
a. Password Check
b. Data Integrity check
c. Digital Signatures
d. Data retrieval in its original form
40. "The Hash Function takes an input of arbitrary length and converts it into a fixed
length output."
Which of the following names can we use for denoting the output of the hash function?
a. Hash value
b. Hash Code
c. Message Digest
d. All of the above
Q3.