Cryptography and Network Security (Anna University) Cryptography and Network Security (Anna University)
Cryptography and Network Security (Anna University) Cryptography and Network Security (Anna University)
2. How many layers are present in the TCP/IP Reference model? LT1
a) 6
b) 7
c) 5
d) 4
Answer: d
Explanation: There are 4 layers in the TCP/IP reference model : Link, Internet, Transport and
Application.
3. A device that helps prevent congestion and data collisions – LT1
a) Switch
b) Hub
c) Gateway
d) Proxy Server
Answer: a
Explanation: A switch is a device that splits large networks into smaller segments, decreasing the
number of users sharing the same network resources and bandwidth.
4. A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200-kbps LT2
bandwidth. Find the throughput if the system (all stations together) produces 1000 frames per
second.
a) 92 frames
b) 368 frames
c) 276 frames
d) 151 frames
Answer: b
Explanation: G =1 S=G×e−G=0.368 (36.8%)Throughput = 1000 × 0.0368 = 368 frames.
5. Which one of these does not lie in the Link Layer of the TCP/IP Model? LT2
a) DSL
b) IP
c) SONET
d) 802.11
Answer: d
Explanation: Solve using polynomial division and then appending the remainder to the divisor.
7. Assume we need to download text documents at the rate of 100 pages per second. What is the LT2
required bit rate of the channel?
a) 1.846 Mbps
b) 1.536 Mbps
c) 2.4 Mbps
d) None of the Mentioned
Answer: b
Explanation: Average No, of lines u=in each page = 24
Each line has 80 char.Each char required 8 bits.100 x 24 x 80 x 8 = 1,536,000=1536 Mbps.
8. A packet has arrived in which the offset value is 100, the value of HLEN is 5 and the value of the LT1
total length field is 100. What is the number of the last byte
a) 880
b) 879
c) 881
d) 801
Answer: b
Explanation:
Total data bytes = total length – header length = 80 bytes in this datagram.Last byte is therefore
879.
9. In an IP packet, the value of HLEN is 516 and the value of the total length field is 002816.What is LT1
the efficiency of this datagram?
a) 80%
b) 50%
c) 66%
d) 75%
Answer: b
Explanation:
Total number of bytes in the header = 5 x 4 = 20 bytes.
Total length = 0028_16 = 40 bytes.
Data carried by the packet = (40 – 20) = 20 bytes.
Efficiency = payload length / total length = 20/40= 50%.
Answer: b
Explanation: Nsub = n + log2(N/Nsub) is used to find the prefix length.
11. Convert the following binary notation to hexadecimal notation – LT2
10000000 00001011 00000011 00011111
a) 0x 80 0B 03 1E
b) 0x 81 0B 04 1E
c) 0x 80 0C 03 1F
d) 0x 80 0B 03 1F
Answer: d
Explanation: Converting the binary value to their respective hex values yields 0x 80 0B 03 1F.
12. If the first address is First address = 18.14.12.0/22. What is the last address? LT2
a) 18.14.15.128/22
b) 18.14.15.64/22
c) 18.14.15.32/22
d) 18.14.15.255/22
Answer: d
Explanation: Last address = (any address) OR [NOT (network mask)].
The Last Address = 18.14.15.255/22.
13. A router receives a packet with the destination address 132.7.21.84. Find the network address of LT2
the packet.
a) 1.32.7
b) 132.7
c) 13.27
d) 21.84
Answer: b
Explanation: 132 is between 128 and 191, so it is Class B address i.e. n=16-bit. Therefore,
Network address 132.7,Host address 21.84
14. After performing bit stuffing on the following stream : 01101111111111111110010, the output is- LT1
a) 01101111101111101111100010
b) 01101111111111111110010111
c) 10010000000000000000001101
d) 01101111111111111111110010
Answer: a
Explanation: Bit stuffing involves adding a 0 after every five 1s during transmission.
15. The first address in a range of addresses is 14.11.45.96. If the number of addresses in the range is LT1
32, what is the last address?
a) 14.11.44.64
Answer: d
Explanation: Last Address = (14.11.45.96 + 0.0.0.31)_256 = 14.11.45.127.
16. In which year Apple II virus came into existence? LT2
a) 1979
b) 1980
c) 1981
d) 1982
Answer: c
Explanation: In mid-1981, the 1st virus for Apple computers with the name Apple II came into
existence. It was also called Elk Cloner, which resided in the boot sectors of a 3.3 floppy disk.
17. _______________ infects the master boot record and it is challenging and a complex task to LT2
remove this virus.
a) Boot Sector Virus
b) Polymorphic
c) Multipartite
d) Trojans
Answer: a
Explanation: Boot Sector Virus infects the master boot record & it is a challenging & a complex task
to remove such virus. Mostly such virus spreads through removable devices.
18. The virus hides itself from getting detected by ______ different ways. LT2
a) 2
b) 3
c) 4
d) 5
Answer: b
Explanation: The virus hides itself from getting detected in three different ways. These are by
encrypting itself, by altering the disk directory with additional virus bytes or it uses stealth
algorithm to redirect disk data.
19. In mid-1981, the 1st virus for Apple computers with the name _________ came into existence. LT2
a) Apple I
b) Apple II
c) Apple III
d) Apple Virus
Answer: b
Explanation: In mid-1981, the 1st virus for Apple computers with the name Apple II came into
existence. It was also called Elk Cloner, which resided in the boot sectors of a 3.3 floppy disk.
Answer: c
Explanation: The ideal means of spreading computer virus are through emails, USB drives that are
used portable and injected and ejected in different systems as well as from infected websites.
Antivirus selling vendors do not place a virus in their CDs and DVDs.
21. Direct Action Virus is also known as ___________ LT1
a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: a
Explanation: Direct Action Virus is also known as a non-resident virus which gets installed & stays
hidden in your computer’s memory. Such type of virus stays involved to the specific type of files
which it infects.
22. ______________ infects the executables as well as the boot sectors. LT2
a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: d
Explanation: Multipartite Virus infects the executables as well as the boot sectors. It infects the
computer or get into any system through multiple mediums and are hard to remove.
23. ______________ are difficult to identify as they keep on changing their type and signature. LT2
a) Non-resident virus
b) Boot Sector Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: c
Explanation: Polymorphic Virus is difficult to identify as they keep on changing their type and
signature. They’re not easily detectable by traditional antivirus. It usually changes the signature
pattern whenever it replicates itself.
24. ____________ deletes all the files that it infects. LT2
a) Non-resident virus
b) Overwrite Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: d
Explanation: Computer virus is not created for protection. Virus writers may have other reasons
like for research purpose, pranks, vandalism, financial gain, identity theft, and some other
malicious purposes.
26. _____________ is also known as cavity virus. LT1
a) Non-resident virus
b) Overwrite Virus
c) Polymorphic Virus
d) Space-filler Virus
Answer: d
Explanation: Space-fillers are a special type of virus which usually does not cause any serious harm
to the system except it fills up the empty space in memory and codes leading to wastage of
memory.
27. A computer ________ is a malicious code which self-replicates by copying itself to other programs. LT1
a) program
b) virus
c) application
d) worm
Answer: b
Explanation: A computer virus is a malicious code which self-replicates by copying itself to other
programs. The computer virus gets spread by itself into other executable code or documents. The
intention of creating a virus is to infect vulnerable systems.
28. Which of the following is not a type of virus? LT2
a) Boot sector
b) Polymorphic
c) Multipartite
d) Trojans
Answer: d
Explanation: Types of viruses are System or Boot Sector Virus, Direct Action Virus, Resident Virus,
Multipartite Virus, Polymorphic Virus, Overwrite Virus, Space-filler Virus, File infectors, Macro
Virus, Rootkit virus. Trojan does not come under types of virus.
Answer: c
Explanation: There are a total of 10 types of virus. These are categorized based on their working
and characteristics. These are System or Boot Sector Virus, Direct Action Virus, Resident Virus,
Multipartite Virus, Polymorphic Virus, Overwrite Virus, Space-filler Virus, File infectors, Macro
Virus, Rootkit virus.
30. LT2
________________ gets installed & stays hidden in your computer’s memory. It stays involved to
the specific type of files which it infects.
a) Boot Sector Virus
b) Direct Action Virus
c) Polymorphic Virus
d) Multipartite Virus
Answer: b
Explanation: Direct Action Virus gets installed & stays hidden in your computer’s memory. Such
type of virus stays involved to the specific type of files which it infects.