0% found this document useful (0 votes)
129 views2 pages

Cryptography MCQs

The document contains multiple-choice questions (MCQs) related to cryptography and network security, covering topics such as types of attacks, cryptographic processes, and security mechanisms. Key concepts include passive attacks like eavesdropping, denial of service attacks, cryptanalysis, and the importance of cryptographic hash functions for ensuring integrity. Additionally, it discusses the role of encryption in confidentiality and non-repudiation in message security.

Uploaded by

k.nitish001705
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
129 views2 pages

Cryptography MCQs

The document contains multiple-choice questions (MCQs) related to cryptography and network security, covering topics such as types of attacks, cryptographic processes, and security mechanisms. Key concepts include passive attacks like eavesdropping, denial of service attacks, cryptanalysis, and the importance of cryptographic hash functions for ensuring integrity. Additionally, it discusses the role of encryption in confidentiality and non-repudiation in message security.

Uploaded by

k.nitish001705
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cryptography and Network Security - MCQs

1. Which of the following is a passive attack?


a) Denial of Service
b) Modification of messages
c) Eavesdropping
d) Masquerade
Answer: c) Eavesdropping

2. In which type of attack does the attacker attempt to prevent legitimate users from accessing a
service?
a) Replay Attack
b) Denial of Service (DoS)
c) Masquerade
d) Traffic Analysis
Answer: b) Denial of Service (DoS)

3. The process of breaking a cryptographic system is called:


a) Cryptography
b) Cryptology
c) Cryptanalysis
d) Steganography
Answer: c) Cryptanalysis

4. What does a cryptographic hash function ensure?


a) Confidentiality
b) Integrity
c) Authentication
d) Authorization
Answer: b) Integrity

5. Which of the following is NOT a security mechanism?


a) Digital Signature
b) Encryption
c) Traffic Analysis
d) Authentication
Answer: c) Traffic Analysis

6. Passive attacks involve:


a) Modification of messages
b) Interruption of communication
c) Monitoring of communication without alteration
d) Impersonation of users
Answer: c) Monitoring of communication without alteration

7. A masquerade attack occurs when:


a) An attacker floods a system with requests
b) An attacker impersonates another user
c) An attacker modifies data in transit
d) An attacker extracts encryption keys
Answer: b) An attacker impersonates another user

8. Encryption is mainly used to ensure:


a) Integrity
b) Availability
c) Confidentiality
d) Authentication
Answer: c) Confidentiality

9. Which security service prevents repudiation of a message?


a) Authentication
b) Confidentiality
c) Non-repudiation
d) Integrity
Answer: c) Non-repudiation

10. A brute force attack involves:


a) Using cryptographic techniques to decrypt a message
b) Trying all possible keys until the correct one is found
c) Exploiting software vulnerabilities
d) Using social engineering to obtain passwords
Answer: b) Trying all possible keys until the correct one is found

You might also like