0% found this document useful (0 votes)
17 views

IS Objective Answers

The document contains questions about cryptography concepts like ciphers, encryption algorithms, attacks etc. and their correct answers. Some key points: - A cipher is an algorithm used for encryption and decryption. Ciphers can be substitution ciphers which replace symbols or transposition ciphers which rearrange the order of letters. - Common symmetric encryption algorithms discussed include DES, AES and their key sizes and number of rounds. Asymmetric algorithms like RSA and Diffie-Hellman using public/private key pairs are also mentioned. - Types of attacks covered are things like man-in-the-middle attacks, encryption vulnerabilities like lack of authentication. Passive attacks monitor network traffic while active attacks alter messages. -

Uploaded by

dineshxoptional
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

IS Objective Answers

The document contains questions about cryptography concepts like ciphers, encryption algorithms, attacks etc. and their correct answers. Some key points: - A cipher is an algorithm used for encryption and decryption. Ciphers can be substitution ciphers which replace symbols or transposition ciphers which rearrange the order of letters. - Common symmetric encryption algorithms discussed include DES, AES and their key sizes and number of rounds. Asymmetric algorithms like RSA and Diffie-Hellman using public/private key pairs are also mentioned. - Types of attacks covered are things like man-in-the-middle attacks, encryption vulnerabilities like lack of authentication. Passive attacks monitor network traffic while active attacks alter messages. -

Uploaded by

dineshxoptional
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

1.

A substitution cipher substitute’s one symbol with [b ]


(a) Keys (b) Others
(c) Multi Parties (d) Single Party
2. [ c]
We use Cryptography term to transforming messages to make them secure
and immune to
(a)Change (b)Idle
(c)Attacks (d)Defend
3. [a ]
In cryptography ,what is cipher?
(a) Algorithm for performing encryption and decryption
(b) encrypted message (c)Both A & B (d) None of the
mentioned
4. In cryptography, the order of the letters in a message is rearranged by [ a]
(a) Transposition Cipher (b)Substitution Ciphers
(c)Both A&B (d)None of the mentioned
5. [ a]
Man-in-the-middle attack can endanger security of Diffie-
Hellman method if two parties are not
(a) Authenticated (b) Joined
(c) Submit (d) Separate
6. [c ]
Which one of the following algorithm is not used in asymmetric-key
cryptography?
(a) RSA Algorithm (b)Diffie-Hellman
(c)l Electronic code Book Algorithm (d)None of the mentioned
7. [b ]
An asymmetric-key(or public-key)cipher uses
(a)1Key (b)2Key
(c)3 key (d) None
8. [c ]
A straight permutation cipher or a straight P-box has same number of
inputs as
(a) Cipher (b)Frames
(c)Outputs (d) None
9. The original message digest algorithm is called as . [ c]
(a) MAC (b)SHA
(c)MD (d)DSA
10. The MD5 is a message digest algorithm developed by . [ a]
(a) Ron Rivest (b)White Field Diffie
(c)Martin Hellman (d)Diffie-Hellman
1. In CIA Triad ‘A’ stands for [ a]
(a) Availability (b) Authentication
(c) Authorization (d) Attack
2. How many transposition techniques are there [ ]
(a)2 (b) 1
(c)3 (d)4
3. Is a possible danger that might exploit a vulnerability to breach security [a ]
and thus cause possible harm.
(a) Threat (b) Attack
(c)Both (d) None
4. Technique in which the letters of the plain text are replaced by other [ c]
letters or by numbers or symbols.
(a) Stegnography (b) Cryptography
(c)Substitution (d) Transposition
5. An asymmetric-key(or public-key)cipher uses [ b]
(a)1Key (b)2Key
(c)3 key (d) None
6. IDEA is a _______ type of algorithm [ a]
(a)Block cipher (b) Stream cipher
(c)Both (d) None
7. What is the key size of DES algorithm [ a]
(a) 56 (b) 64
(c)48 (d) 128
8. What is the key size of AES algorithm [ d]
(b) 56 (b) 64
(c)48 (d) 128
9. Helps in ensuring non-fraudulent transactions on the web. [a ]
(a)Certificate authority (b)Digital authority
(c)Dual authority (d)Digital signature
10. Digital signature envelope is
[b ]
decrypted by using
(a)Merchant private key (b)Payment’s private key
(c)Payment public key (d)Merchant’s public key
1. This principle ensures only sender and receiver have access to the message [ a ]
(a) confidentiality (b) authentication
(c)integrity (d) access control
2. If the recipient of a message has to be satisfied with identity of sender [ b ]
(a) confidentiality (b) authentication
(c)integrity (d) access control
3. The contents of a message must not be modified while in transit the principle is [ a ]
(a) confidentiality (b) authentication
(c)integrity (d) access control
4. Sender of message later cannot claim that message was never sent by him [ d ]
(a) confidentiality (b) authentication
(c)integrity (d) non repudiation
5. In this type of attack there is no modification to message contents [ a ]
(a) passive (b) active
(c) both a and b (d) none of the above
6. Caesar cipher is an example of [ a ]
(a) substitution cipher (b) transposition cipher
(c) both a & b (d)none of the above
7. One-time pad is an example of [ ]
(a) substitution cipher (b) transposition cipher
(c) both a & b (d)none of the above
8. Rail fence technique is an example of [ b]
(a) substitution cipher (b) transposition cipher
(c) both a & b (d)none of the above
9. One bit of plain text is encrypted at a time [ a ]
(a)stream cipher (b)block cipher
(c) both a & b (d) none of the above
10 One block of plain text is encrypted at a time [ b ]
.
(a)stream cipher (b)block cipher
(c) both a & b (d) none of the above
1. This attack is related to confidentiality [ a]
(a) interception (b) fabrication
(c) modification (d)interruption
2. This attack is related to authentication [ b ]
(a) interception (b) fabrication
(c) modification (d)interruption
3. This attack is related to integrity [ c ]
(a) interception (b) fabrication
(c) modification (d)interruption
4. This attack is related to availability [ d ]
(a) interception (b) fabrication
(c) modification (d)interruption
5. In this type of attacks ,there is no modification to message contents [a ]
(a)passive (b)active
(c) both a&b (d) none of the above
6. In this type of attacks , message contents are modified [ b ]
(a)passive (b)active
(c) both a&b (d) none of the above
7. Number of rounds in DES algorithm [ a ]
(a) 16 (b) 17
(c) 52 (d) 48
8. If number of rounds in AES is 12 then key size is [ a ]
(a) 192 (b) 256
(c) 128 (d) 512
9. The contents of a message must not be modified while in transit the principle is [ a ]
(a) confidentiality (b) authentication
(c)integrity (d) non repudiation
10 Sender of message later cannot claim that message was never sent by him [ d ]
.
(a) confidentiality (b) authentication
(c)integrity (d) non repudiation
II. Fill in the blanks
11. DES encrypts blocks of ___64____bits

12.DES after encryption gets cipher text of _____64____bits.

13. AES encrypts plain text of size______128___bits.

14. after encryption AES gets output cipher text of _____128__bits.

15. number of rounds in DES algorithm___16____.

16. if key size in AES is 128 bits then number of rounds is ____10___.

17. if we are using same key for encryption and decryption then it is

_____________symmetric encryption_______________.

18. if we are using one key for encryption and different key for decryption

then it is Called __________asymmetric encryption__________________.

19. IDEA Algorithm takes input plain text of________64____bits.

20. if key size in AES is 192 bits then number of rounds is __12_______.
11. confidentiality means _______preserving authorized restrictions on
access and disclosure, including means for protecting personal
privacy and proprietary information.
_____________________________________________.
12.integrity means________________data is complete, trustworthy and
has not been modified or accidentally altered by an unauthorised
user __________________________________________.
13. authentication means__________used by a server when the server
needs to know exactly who is accessing their information or site.
__________________________________________.
14. non repudiation means_______________assurance that someone
cannot deny the validity of something.
___________________________________.
15. the process of converting plain text into cipher text is
called__________encryption________.
16. if we are encrypting and decrypting message with same key it is called
_______symmetric_____________cryptography.
17. if different keys are used for encrypting and decrypting then it is called
____________asymmetric_________________cryptography.
18. symmetric key cryptography is also called_______________private key
cryptography____________.
19. Assymmetric key cryptography is also called________________public key
cryptography__________.
20. RC4 is a __________stream_________cipher.

11. _________________security mechanism__________mechanism that is


designed to detect, prevent or recover from a security attack.
12. Any action that compromises the security of information owned by an organization is
security attach___
13._________threat______is a possible danger that might exploit a vulnerability to
breach security and thus cause possible harm.
14. A masquerade takes place when one entity pretends to be a different entity.
15. In RSA algorithm cipher text c =

16.________________cryptology__________is the study of cryptography and cryptanalysis


together.
17. A primality testing is a test to determine whether or not a given number is prime.
18. In public key cryptography, ___two__________keys are used.
19. MAC stands for____________message authentication code_____________________
20.SHA Stands for ________Secure hash algorithm_________

11 ._____active_____________attacks involve modification of contents


12. ________________passive_________ attacks can’t be noticed.
13. _____________transposition_______technique in which performs some sort of
permutation on the plaintext.
Letters
14.______________substitution______________technique in which the letters of the plain text are
replaced by other letters or by numbers or symbols
15.______________steganography________is a technique for hiding the original message
16. _____________asymmetric________encryption algorithms make use of two keys one for
encryption and other for decryption.
17.A ___stream___cipher is one that encrypts a digital data stream one bit or one
byte at a time.
18.A____________block_______is one in which a block of plain text is treated as a
whole and used to produce a cipher text block of equal block

19.RC5 is a _______________symmetric key-block________ cipher mode of algorithm.


20.Attacks on MAC are ________________________
21. A hash function accepts a variable size message as input and produces a _fixed
size output

You might also like