Sei sulla pagina 1di 5

1) A sender S sends a message m to receiver R, which is digitally signed by S with its private key.

In this scenario,
one or more of the following security violations can take place.

(I)  S can launch a birthday attack to replace m with a fraudulent message.

(II)  A third party attacker can launch a birthday attack to replace m with a fraudulent message.

(III)  R can launch a birthday attack to replace m with a fraudulent message.

Which of the following are possible security violations?

(A) (I) and (II) only
(B) (I) only
(C) (II) only
(D) (II) and (III) only

Answer : (B)

2) In a RSA cryptosystem, a participant A uses two prime numbers p=13 and q=17 to genrate her public and
private keys. If the public key of A is 35, then the privae key of A is __________.

(A) 11

(B) 13

(C ) 7

(D) 9

Answer : (A)

3) Anand digitally signs a message and sends it to Salim. Verification of the signature by Salim requires

(A) Anand’s public key

(B) Salim’s public key.

(C) Salim’s private key.

(D) Anand’s private key

Answer : (A)

4) Which of the following are used to generate a message digest by the network security protocols?
(P) RSA (Q) SHA-1 (R) DES (S) MD5

(A) P and R Only

(B) Q and R Only

(C) Q and S Only

(D) R and S only

Answer : (C)
5) Using public key cryptography, X adds a digital signature σ to message M, encrypts <M, σ>, and sends it to
Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?

(A) Encryption: X’s private key followed by Y’s private key; Decryption: X’s public key followed by Y’s public key

(B) Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed by Y’s private key

(C) Encryption: X’s public key followed by Y’s private key; Decryption: Y’s public key followed by X’s private key

(D) Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key

Answer : (D)

6) In the RSA public key cryptosystem, the private and public keys are (e,n) and (d,n) respectively,
where n=p*q and p and q are large primes. Besides, n is public and p and q are private. Let M be an integer such
that 0<M<n and Φ(n) = (p-1)(q-1). Now consider the following equations.

I.   M' = Me mod n
M =(M')d mod n
II.  ed ≡≡ 1mod n
III. ed ≡≡ 1mod Φ(n)
IV. M' = Me mod Φ(n)    
     M = (M')d mod Φ(n)
Which of the above equations correctly represent RSA cryptosystem?

(A) I and II
(B) I and III
(C) II and IV
(D) III and IV

Answer: (B)

7) Consider the following two statements:

i. A hash function (these are often used for computing digital signatures) is an injective function.

ii. Encryption technique such as DES performs a permutation on the elements of its input alphabet.

Which one of the following options is valid for the above two statements?

(A) Both are false

(B) Statement (i) is true and the other is false

(C) Statement(ii) is true and the other is false.

(D) Both are true

Answer : (C)

8) S1- MD5 is vulnerable to the Birthday attack.

S2- traceroute uses the "Destination port unreachable" ICMP error message.

S3- 3DES is a type of Public Key Encrytion Algorithm.


S4- IPv6 has a 40-byte fixed header size(without Options fields).
How many of the above statements are true?
(A) 2
(B) 3
(C) 4
(D) None of these

Answer: (B)

9) An attacker sits between customer and Banker, and captures the information from the customer
and retransmits to the banker by altering the information. This attack is called as ______.

(A) Masquerade attack

(B) Replay Attack

(C) Passive Attack

(D) Denial of service Attack

Answer : (B)

10) Encrypt the plain text Message “EXTRANET” using Transposition cipher technique with the following
key:

Using ‘Z’ as bogus character.

(A) TAXERTZENZ

(B) EXTRANETZZ

(C) EZXZTRZANZET

(D) EXTZRANZETZ

Answer : (A)

11) Which of the following encryption algorithms is based on the Fiestal struture?

(A) AES

(B) RSA
(C) DES

(D) RC4

Answer : (C)

12) The standard for certificates used on internet is

(A) X.25

(B) X.301

(C) X.409

(D) X.509

Answer : (D)

13) Which of the following attacks is a passive attack?

a. Masquerade
b. Modification of message
c. Denial of service
d. Traffic analysis

Answer: d) Traffic analysis

14) Which of the following is not a principle of data security?

a. Data Confidentiality
b. Data Integrity
c. Authentication
d. None of the above

Answer: d) None of the above

15) Consider that B wants to send a message m that is digitally signed to A. Let the pair of
private and public keys for A and B be denoted by Kx- and Kx+ for x=A,B, respectively. Let
Kx(m) represent the operation of encrypting m with a key K x and H(m) represent the message
digest. Which of the following indicates the correct way of sending the message m along with
the digital signature to A?

(A){m,KB+(H(m))}

(B) ){m,KB- (H(m))}

(C) ){m,KA-(H(m))}
(D) ){m,KA+(H(m))}

Answer : (B)

Potrebbero piacerti anche