Sei sulla pagina 1di 8

Code No: 117DY Set No.

1
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
IV B. Tech. I Sem., I Mid-Term Examinations, September -2017
INFORMATION SECURITY
Objective Exam
Name: ______________________________ Hall Ticket No. A
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 10.

I. Choose the correct alternative:

1. What is data encryption standard (DES)? [ ]


A) block cipher B) stream cipher C) bit cipher D) none of the mentioned

2. An act to convert plaintext into ciphertext in order to preserve confidentiality of data is called?
[ ]
A) Encryption B) Decryption C) Hash D) Message authentication

3. _________ increases the redundancy of plain text. [ ]


A) Confusion B) Diffusion C) Both confusion and diffusion D) Neither confusion nor diffusion

4. Book Cipher is also called as [ ]


A) Rail Fence Technique B) One-time pad C) Mono-alphabetic Cipher D) Running Key Cipher

5. A stream cipher takes a key K of n bits in length and stretches it into along ___________.[ ]
A) Keystream. B) Search key. C) Key length. D) Public key.

6. If both sender and receiver use the same key the system is referred to as _________ encryption.
[ ]
A) symmetric B) public key C) asymmetric D) two-key

7. The Advanced Encryption Standard (AES), has three different configurations with respect to the number
of rounds and [ ]
A) Data Size B)Round Size C)Key Size D)Encryption Size

8. What kind of certificate is used to validate a user identity? [ ]


A) Public key certificate B) Attribute certificate C) Root certificate D) Code signing certificate

9. Which of the following is NOT an asymmetric key algorithm? [ ]


A) RSA B) Elliptic Curve Cryptosystem (ECC) C) El Gamal D) Data Encryption System (DES)

10. The RSA algorithm is an example of what type of cryptography? [ ]


A) Asymmetric Key B) Symmetric Key C) Secret Key. D) Private Key.

Cont..2
Code No: 117DY :2: Set No. 1

II Fill in the Blanks

11. __________________________ Assures that private or confidential information is not made available
or disclosed to unauthorized individuals.

12. __________________________ Assures that systems work promptly and service is not denied to
authorized users.

13. The property of being genuine and being able to be verified and trusted is called
______________________.

14. Any action that compromises the security of information owned by an organization is called
_________________.

15. _______________ attacks are in the nature of eavesdropping on, or monitoring of, transmissions.

16. In _________________ attack, the attacker tries every possible key on a piece of cipher text until an
intelligible translation into plaintext is obtained.

17. A __________cipher is one that encrypts a digital data stream one bit or one byte at a time.

18. In ___________________ method, each plaintext element or group of elements is uniquely replaced by
a corresponding cipher text element or group of elements.

19. ________________ function that maps a message of any length into a fixed length value, which serves
as the authenticator.

20. A function of the message and a secret key that produces a fixed-length value that serves as the
authenticator is _______________________________.

-oOo-
Code No: 117DY Set No. 2
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
IV B. Tech. I Sem., I Mid-Term Examinations, September -2017
INFORMATION SECURITY
Objective Exam
Name: ______________________________ Hall Ticket No. A
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 10.

I. Choose the correct alternative:

1. Book Cipher is also called as [ ]


A) Rail Fence Technique B) One-time pad C) Mono-alphabetic Cipher D) Running Key Cipher

2. A stream cipher takes a key K of n bits in length and stretches it into along ___________.[ ]
A) Keystream. B) Search key. C) Key length. D) Public key.

3. If both sender and receiver use the same key the system is referred to as _________ encryption.
[ ]
A) symmetric B) public key C) asymmetric D) two-key

4. The Advanced Encryption Standard (AES), has three different configurations with respect to the number
of rounds and [ ]
A) Data Size B)Round Size C)Key Size D)Encryption Size

5. What kind of certificate is used to validate a user identity? [ ]


A) Public key certificate B) Attribute certificate C) Root certificate D) Code signing certificate

6. Which of the following is NOT an asymmetric key algorithm? [ ]


A) RSA B) Elliptic Curve Cryptosystem (ECC) C) El Gamal D) Data Encryption System (DES)

7. The RSA algorithm is an example of what type of cryptography? [ ]


A) Asymmetric Key B) Symmetric Key C) Secret Key. D) Private Key.

8. What is data encryption standard (DES)? [ ]


A) block cipher B) stream cipher C) bit cipher D) none of the mentioned

9. An act to convert plaintext into ciphertext in order to preserve confidentiality of data is called?
[ ]
A) Encryption B) Decryption C) Hash D) Message authentication

10. _________ increases the redundancy of plain text. [ ]


A) Confusion B) Diffusion C) Both confusion and diffusion D) Neither confusion nor diffusion

Cont..2
Code No: 117DY :2: Set No. 2

II Fill in the Blanks

11. Any action that compromises the security of information owned by an organization is called
_________________.

12. _______________ attacks are in the nature of eavesdropping on, or monitoring of, transmissions.

13. In _________________ attack, the attacker tries every possible key on a piece of cipher text until an
intelligible translation into plaintext is obtained.

14. A __________cipher is one that encrypts a digital data stream one bit or one byte at a time.

15. In ___________________ method, each plaintext element or group of elements is uniquely replaced by
a corresponding cipher text element or group of elements.

16. ________________ function that maps a message of any length into a fixed length value, which serves
as the authenticator.

17. A function of the message and a secret key that produces a fixed-length value that serves as the
authenticator is _______________________________.

18. __________________________ Assures that private or confidential information is not made available
or disclosed to unauthorized individuals.

19. __________________________ Assures that systems work promptly and service is not denied to
authorized users.

20. The property of being genuine and being able to be verified and trusted is called
______________________.

-oOo-
Code No: 117DY Set No. 3
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
IV B. Tech. I Sem., I Mid-Term Examinations, September -2017
INFORMATION SECURITY
Objective Exam
Name: ______________________________ Hall Ticket No. A
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 10.

I. Choose the correct alternative:

1. If both sender and receiver use the same key the system is referred to as _________ encryption.
[ ]
A) symmetric B) public key C) asymmetric D) two-key

2. The Advanced Encryption Standard (AES), has three different configurations with respect to the number
of rounds and [ ]
A) Data Size B)Round Size C)Key Size D)Encryption Size

3. What kind of certificate is used to validate a user identity? [ ]


A) Public key certificate B) Attribute certificate C) Root certificate D) Code signing certificate

4. Which of the following is NOT an asymmetric key algorithm? [ ]


A) RSA B) Elliptic Curve Cryptosystem (ECC) C) El Gamal D) Data Encryption System (DES)

5. The RSA algorithm is an example of what type of cryptography? [ ]


A) Asymmetric Key B) Symmetric Key C) Secret Key. D) Private Key.

6. What is data encryption standard (DES)? [ ]


A) block cipher B) stream cipher C) bit cipher D) none of the mentioned

7. An act to convert plaintext into ciphertext in order to preserve confidentiality of data is called?
[ ]
A) Encryption B) Decryption C) Hash D) Message authentication

8. _________ increases the redundancy of plain text. [ ]


A) Confusion B) Diffusion C) Both confusion and diffusion D) Neither confusion nor diffusion

9. Book Cipher is also called as [ ]


A) Rail Fence Technique B) One-time pad C) Mono-alphabetic Cipher D) Running Key Cipher

10. A stream cipher takes a key K of n bits in length and stretches it into along ___________.[ ]
A) Keystream. B) Search key. C) Key length. D) Public key.

Cont..2
Code No: 117DY :2: Set No. 3

II Fill in the Blanks

11. In _________________ attack, the attacker tries every possible key on a piece of cipher text until an
intelligible translation into plaintext is obtained.

12. A __________cipher is one that encrypts a digital data stream one bit or one byte at a time.

13. In ___________________ method, each plaintext element or group of elements is uniquely replaced by
a corresponding cipher text element or group of elements.

14. ________________ function that maps a message of any length into a fixed length value, which serves
as the authenticator.

15. A function of the message and a secret key that produces a fixed-length value that serves as the
authenticator is _______________________________.

16. __________________________ Assures that private or confidential information is not made available
or disclosed to unauthorized individuals.

17. __________________________ Assures that systems work promptly and service is not denied to
authorized users.

18. The property of being genuine and being able to be verified and trusted is called
______________________.

19. Any action that compromises the security of information owned by an organization is called
_________________.

20. _______________ attacks are in the nature of eavesdropping on, or monitoring of, transmissions.

-oOo-
Code No: 117DY Set No. 4
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
IV B. Tech. I Sem., I Mid-Term Examinations, September -2017
INFORMATION SECURITY
Objective Exam
Name: ______________________________ Hall Ticket No. A
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 10.

I. Choose the correct alternative:

1. What kind of certificate is used to validate a user identity? [ ]


A) Public key certificate B) Attribute certificate C) Root certificate D) Code signing certificate

2. Which of the following is NOT an asymmetric key algorithm? [ ]


A) RSA B) Elliptic Curve Cryptosystem (ECC) C) El Gamal D) Data Encryption System (DES)

3. The RSA algorithm is an example of what type of cryptography? [ ]


A) Asymmetric Key B) Symmetric Key C) Secret Key. D) Private Key.

4. What is data encryption standard (DES)? [ ]


A) block cipher B) stream cipher C) bit cipher D) none of the mentioned

5. An act to convert plaintext into ciphertext in order to preserve confidentiality of data is called?
[ ]
A) Encryption B) Decryption C) Hash D) Message authentication

6. _________ increases the redundancy of plain text. [ ]


A) Confusion B) Diffusion C) Both confusion and diffusion D) Neither confusion nor diffusion

7. Book Cipher is also called as [ ]


A) Rail Fence Technique B) One-time pad C) Mono-alphabetic Cipher D) Running Key Cipher

8. A stream cipher takes a key K of n bits in length and stretches it into along ___________.[ ]
A) Keystream. B) Search key. C) Key length. D) Public key.

9. If both sender and receiver use the same key the system is referred to as _________ encryption.
[ ]
A) symmetric B) public key C) asymmetric D) two-key

10. The Advanced Encryption Standard (AES), has three different configurations with respect to the number
of rounds and [ ]
A) Data Size B)Round Size C)Key Size D)Encryption Size

Cont..2
Code No: 117DY :2: Set No. 4

II Fill in the Blanks

11. In ___________________ method, each plaintext element or group of elements is uniquely replaced by
a corresponding cipher text element or group of elements.

12. ________________ function that maps a message of any length into a fixed length value, which serves
as the authenticator.

13. A function of the message and a secret key that produces a fixed-length value that serves as the
authenticator is _______________________________.

14. __________________________ Assures that private or confidential information is not made available
or disclosed to unauthorized individuals.

15. __________________________ Assures that systems work promptly and service is not denied to
authorized users.

16. The property of being genuine and being able to be verified and trusted is called
______________________.

17. Any action that compromises the security of information owned by an organization is called
_________________.

18. _______________ attacks are in the nature of eavesdropping on, or monitoring of, transmissions.

19. In _________________ attack, the attacker tries every possible key on a piece of cipher text until an
intelligible translation into plaintext is obtained.

20. A __________cipher is one that encrypts a digital data stream one bit or one byte at a time.

-oOo-

Potrebbero piacerti anche