Sei sulla pagina 1di 1

Multiple Choice Questions - Cryptography and Network Security (CS-801D)

1. Choose correct alternatives for the following:


i) Four primary security principles related to a message are
a) confidentiality, authentication, integrity and non-repudiation
b) confidentiality, access control, non-repudiation and integrity
c) authentication, authorization, non-repudiation and availability
d) availability, access control, authorization and authentication.
ii) Book Cipher is also called as
a) Rail-Fence Technique
c) Mono-alphabetic Cipher

b) One-time pad
d) Running Key Cipher

iii) Conversion of cipher text into plain text is called as


a) encryption
b) decryption
c) cryptography
d) cryptanalyst
iv) Redundancy of plain text increased by
a) Confusion
b) Diffusion
c) Both confusion and diffusion
d) Neither confusion nor diffusion
v) Bits contain in DES encrypts blocks
a) 32
b) 56

c) 64

d) 128

vi) SSL (Secure Socket Layer) layer is located between


a) transport layer, network layer
b) application layer, transport layer
c) data link layer, physical layer
d) network layer, data link layer
vii) Firewall is a specialized form of a
a) bridge
b) disk

c) printer

d) router

viii) Application gateways (proxy servers) are ______________ packet filters


a) less secure than
b) more secure than
c) equally secure to
d) slower
ix) In asymmetric key cryptography ____ keys are required per communicating party
a) 2
b) 3
c) 4
d) 5
x) If A and B want to communicate securely with each other, B must not know
a) As private key
b) As public key
c) Bs private key
d) Bs public key
xi) _________ ensures that a message was received by the receiver from the actual sender and not from an
attacker.
a) Authentication
b) Authorization
c) Integration
d) None of these.
xii) Which of the following is a passive attack?
a) Masquerade
c) Denial of service

b) Replay
d) Traffic analysis

xiii) In public-key cryptography, ___________ key is used for encryption


a) public
b) private
c) both (a) and (b)

d) shared

Potrebbero piacerti anche