Questions On Network Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Q1.

Using public key cryptography, X adds a digital signature σ to


message M, encrypts < M, σ >, and sends it to Y, where it is decrypted.
Which one of the following sequences of keys is used for the operations?
(a) Encryption: X’s private key followed by Y’s private key; Decryption:
X’s public key followed by Y’s public key
(b) Encryption: X’s private key followed by Y’s public key; Decryption:
X’s public key followed by Y’s private key
(c) Encryption: X’s public key followed by Y’s private key; Decryption:
Y’s public key followed by X’s private key
(d) Encryption: X’s private key followed by Y’s public key; Decryption:
Y’s private key followed by X’s public key

Q2. Which of the following are used to generate a message digest by the
network security protocols?
i) RSA
ii) SHA-1
iii) DES
iv) MD5
(a) i and iii only
(b) ii and iii only
(c) ii and iv only
(d) iii and iv only

Q3. A sender is employing public key cryptography to send a secret


message to a receiver. Which one of the following statements is TRUE?
(a) Sender encrypts using receiver’s public key
(b) Sender encrypts using his own public key
(c) Receiver decrypts using sender’s public key
(d) Receiver decrypts using his own public key
Q4. Anarkali digitally signs a message and sends it to Salim. Verification
of the signature by Salim requires
(a) Anarkali’s public key
(b) Salim’s public key.
(c) Salim’s private key.
(d) Anarkali’s private key

Q5. The total number of keys required for a set of n individuals to be able
to communicate with each other using secret key and public key crypto-
systems, respectively are:
(a) n(n-1) and 2n
(b) 2n and ((n(n - 1))/2)
(c) ((n(n - 1))/2) and 2n
(d) ((n(n - 1))/2) and n

Q6. Using ‘RSA’ public key cryptosystem, if p = 3, q = 11 and d = 7, find


the value of e and encrypt the number ′5′
(a) 20, 19
(b) 33, 11
(c) 3, 26
(d) 77, 28

Q7. Which among the following statement(s) is(are) true?


i) A hash function takes a message of arbitrary length and generates a
fixed length code
ii) A hash function takes a message of fixed length and generates a
code of variable length
iii) A hash function may give same hash value for distinct messages
Choose the correct answer from the options given below:
(a) I only (b) II and III only
(c) I and III only (d) II only
Q8. An attacker sits between customer and Banker, and captures the
information from the customer and retransmits to the banker by altering
the information. This attack is called as ______.
(a) Masquerade Attack
(b) Replay Attack
(c) Passive Attack
(d) Denial of Service Attack

Q9. Which one of the following is true for asymmetric-key cryptography?


(a) Private key is kept by the receiver and public key is announced to the
public.
(b) Public key is kept by the receiver and private key is announced to the
public.
(c) Both private key and public key are kept by the receiver.
(d) Both private key and public key are announced to the public.

Q10. A Trojan horse is _______


(a) A program that performs a legitimate function that is known to an
operating system or its user and also has a hidden component that can
be used for nefarious purposes like attacks on message security or
impersonation.
(b) A piece of code that can attach itself to other programs in the system
and spread to other systems when programs are copied or transferred.
(c) A program that spreads to other computer systems by exploiting
security holes like weaknesses in facilities for creation of remote
processes
(d) All of the above
Q11. A layer-4 firewall (a device that can look at all protocol headers up
to the transport layer) Cannot _______
(a) block entire HTTP traffic during 9:00PM and 5:00AM
(b) block all ICMP traffic
(c) stop incoming traffic from a specific IP address but allow outgoing
traffic to the same IP address
(d) block TCP traffic from a specific user on a multi-user system during
9:00PM and 5:00AM

Q12. What is one advantage of setting up a DMZ (Demilitarized Zone)


with two firewalls?
(a) You can control where traffic goes in the three networks
(b) You can do stateful packet filtering
(c) You can do load balancing
(d) Improve network performance

Q13. Which of the following statements is wrong?


(a) Two IP headers are attached to packet in Tunnel mode of IP-Sec
protocol.
(b) Only the packets from Transport layer will be encapsulated by IP-Sec
header in Transport mode of IP-Sec protocol
(c) A host cannot send a packet directly to another host via tunnel mode of
IP-Sec protocol.
(d) None of these
Q14. Consider the following statements:
S1: Asymmetric key cryptography and digital signature both use the
private and public keys of the sender.
n(n−1)
S2: Public key cryptosystems require keys for a set of n
2
individual to be able to communicate with each other.
Which of the statement’s options are true?
(a) S1 and S2 are True
(b) S1 is true, S2 is false
(c) S1 is False, S2 is True
(d) Both S1 and S2 are False

Q15. Avalanche effect in cryptography refers


(a) Large changes in cipher text when the keyword is changed minimally
(b) Large changes in cipher text when the plain text is changed
(c) Large Impact of keyword change to length of the cipher text
(d) None of the above
Ans:
1. D
2. C
3. A
4. A
5. C
6. C
7. C
8. B
9. A
10. A
11. D
12. A
13. B
14. D
15. A

You might also like