Symmetric Cipher": A) Passive Attack
Symmetric Cipher": A) Passive Attack
Symmetric Cipher": A) Passive Attack
Symmetric Cipher”
5) if both sender and receiver use the same key the system is
referred to as _________ encryption.
a) Symmetric b) public-key
c) Asymmetric d) two-key
6) If the sender and receiver each use a different key the system
is referred to as __________encryption.
a) secret-key b) asymmetric
c) conventional d) single-key
10) The _________ key size is used with the Data Encryption
Standard algorithm.
a) 128 bit b) 56 bit
c) 32 bit d) 168 bit
20) S-Boxes has ___ bit input and ____ bit output
a) 5, 3 b) 6, 4
c) 6, 3 d) 8, 4
22) DES takes ____ bit plaintext and generate ____ bit ciphertext
a) 56, 56 b) 64, 56
c) 56, 64 d) 64, 64
23) ::DES round key generator create ___ bit keys out of ___ bit
cipher key.
a) 48, 56 b) 48, 64
c) 56, 64 d) 56, 64
24) _____ hides the relationship between cipher text and plain
tex.
a) Confusion b) Diffusion
c) Avalanche effect d) None of these
25) _____ hides the relationship between the cipher text and
key.
a) Confusion b) Diffusion
c) Avalanche Effect d) None of these
Chapter 3
9) 11^7 mod 13 =
a) 3 b) 2
c) 9 d) 4
10) In the RSA public key cryptosystem, which one of the following
numbers will always be largest?
a) E b) N
c) P d) Q
17) For 1000 nodes in IP level, how many keys would be required?
a) 499000 b) 499500
c) 500500 d) 500000
20) How many keys are required if two parties communicate using
Asymmetric Encryption
a) One b) Two
c) Three d) Four
Chapter 4
5) Secure Hash Algorithms with hash value lengths of 256, 384, and
512 bits are collectively known as_________ .
a) SHA-3 b) SHA-1
c) SHA-0 d) SHA-2
13) For a 150-bit message and a 10-bit MAC, how many values are
the MAC value dependent on?
a) 2^140 b) 2^150
c) 2^15 d) 2^10
22) In the ______ mode, IPSec protects information delivered from the
transport layer to the network layer.
a) Transport b) Tunnel
c) Either a or b d) Neither a nor b
23) IPSec in the ______ mode does not protect the IP header
a) Transport b) Tunnel
c) Either a or b d) Neither a nor b
25) In the _______ mode, IPSec protects the whole IP packet, including
the original IP header.
a) Transport b) Tunnel
c) Either a or b d) Neither a nor b
26) IPSec defines two protocols: _______ and ________.
a) AH, SSL b) PGP, ESP
c) AH, ESP d) None of above
30) In _______, the cryptographic algorithms and secrets are sent with
the message
a) IPSec b) SSL
c) TLS d) PGP
Chapter 6
Introduction to Blockchain
13) This property ensures that the consensus value should not deviate
from the values which are proposed by individuals in the network
This is the one of the property of Distributed consensus.
a) Termination b) Integrity
c) Agreement d) Scalability
22) What is the process of creating new bitcoins popularly known as?
a) Finding b) Panning
c) Sourcing d) Mining
4) ---- are programs that monitor and record the name & password of
network users as they login , jeopardizing security at a site.
a) Password Sniffers b) Mail Bombs
c) Web Jacking d) E – mail Bombing
4) ---- is a software program that can copy itself and infect the data or
information, without the user’s knowledge.
a) Computer virus b) Computer Worm
c) Antivirus d) All of these
6) ---- acts like a “chameleon” that changes its virus signature every time
is spreads through the system.
a) Mulpartite Virus b) Program virus
c) Boot sector virus d) Polymorphic virus
7) ---- is quicker and easier way of capturing the passwords and
monitoring the victims IT savvy behavior.
a) Mail Bombs b) Phishing
c) Hacking d) Keylogger