Title | Cns mcq - Cryptography and network security multiple choice questions and answers |
---|---|
Author | ramu kumar |
Course | Cryptography and network security MCQ |
Institution | Sri Sai Ram Engineering College |
Pages | 9 |
File Size | 524.7 KB |
File Type | |
Total Downloads | 2 |
Total Views | 178 |
Cryptography and network security multiple choice questions and answers ...
Downlloaded from www.examradar.com
All the Multiple Choice e Question and Answer (MCQs)) have been compiled from the boo oks of Data Communication and Networking by the well known auth hor behrouz A forouzan. This Data Communication and Networking – Crryptography multiple choice Questtions and Answers (MCQ) PDF covers the below lists of topics. 1. Cryptography Mu wer. ultiple Choice Question and Answ
Practice now to sharpen your concept. 1. ________ is the science and art of transforming messages m to make them secure e and immune to attacks. A. Cryptography B. Cryptoanalysis C. either (a) or (b) D. neither (a) nor (b)
2. The ________is the original o message before transform mation A. ciphertext B. plaintext C. secret-text D. none of the above
3. The ________ is the message after transformation A. ciphertext B. plaintext C. secret-text D. none of the above
Downlloaded from www.examradar.com
4. A(n) _______ algoritthm transforms plaintext to ciphertext A. encryption B. decryption C. either (a) or (b) D. neither (a) nor (b)
hm transforms ciphertext to plainttext 5. A(n) ______ algorith A. encryption B. decryption C. either (a) or (b) D. neither (a) nor (b)
n encryption algorithm and a decry yption 6. A combination of an _______. algorithm is called a __ A. cipher B. secret C. key D. none of the above
7. The _______ is a num mber or a set of numbers on which h the cipher operates A. cipher B. secret C. key D. none of the above
8. In a(n) ________ cip pher, the same key is used by both the sender and receiver. A. symmetric-key
Downlloaded from www.examradar.com
B. asymmetric-key C. either (a) or (b) D. neither (a) nor (b)
9. In a(n) ________, the key is called the secret key. A. symmetric-key B. asymmetric-key C. either (a) or (b) D. neither (a) nor (b)
10. In a(n) ________ cipher, a pair of keys is used. A. symmetric-key B. asymmetric-key C. either (a) or (b) D. neither (a) nor (b)
Answer key for MCQ SET- 1 Q-1 Q-2 Q-3 Q-4 Q-5 Q-6 Q-7 Q-8 Q-9 Q-10
Correc ct Answer :Cryptography Correc ct Answer :plaintext Correc ct Answer :ciphertext Correc ct Answer :encryption Correc ct Answer :decryption Correc ct Answer :cipher Correc ct Answer :key Correc ct Answer :symmetric-key Correc ct Answer :symmetric-key Correc ct Answer :asymmetric-key
Downlloaded from www.examradar.com
Cryptography multip ple choice questions and answers MC CQ Set-2
1. In an asymmetric-keey cipher, the sender uses the__________ key. A. private B. public C. either (a) or (b) D. neither (a) nor (b))
2. In an asymmetric-keey cipher, the receiver uses the ___ ____ key A. private B. public C. either (a) or (b) D. neither (a) nor (b)
3. A ________ cipher replaces one character with anothe er character. A. substitution B. transposition C. either (a) or (b) D. neither (a) nor (b))
4. _________ ciphers can be categorized into two broad categories: c olyalphabetic. monoalphabetic and po A. Substitution B. Transposition C. either (a) or (b) D. neither (a) nor (b)
Downlloaded from www.examradar.com
5. The _______ cipher is the simplest monoalphabetic cip pher. It uses modular arithmetic witth a modulus of 26. A. transposition B. additive C. shift D. none of the above
6. The Caesar cipher iss a _______cipher that has a key of o 3. A. transposition B. additive C. shift D. none of the above
7. The ________ cipherr reorders the plaintext characterss to create a ciphertext. A. substitution B. transposition C. either (a) or (b) D. neither (a) nor (b)
puts and M 8. A(n) ______ is a keyless substitution cipher with N inp outputs that uses a form mula to define the relationship bettween the input stream and the ou utput stream A. S-box B. P-box C. T-box D. none of the above
Downlloaded from www.examradar.com
9. A(n) _______is a key yless transposition cipher with N i nputs and M outputs that uses a table to define the relationship betw ween the utput stream input stream and the ou A. S-box B. P-box C. T-box D. none of the above
made of a 10. A modern cipher iss usually a complex _____cipher m combination of differen nt simple ciphers. A. round B. circle C. square D. none of the above
Answer key for MCQ SET- 2 Q-1 Q-2 Q-3 Q-4 Q-5 Q-6 Q-7 Q-8 Q-9 Q-10
Correc ct Answer :public Correc ct Answer :private Correc ct Answer :substitution Correc ct Answer :Substitution Correc ct Answer :shift Correc ct Answer :shift Correc ct Answer :transposition Correc ct Answer :S-box Correc ct Answer :P-box Correc ct Answer :round
Cryptography multip ple choice questions and answers MC CQ Set-3
Downlloaded from www.examradar.com
1. DES is a(n) ________ method adopted by the U.S. government. A. symmetric-key B. asymmetric-key C. either (a) or (b) D. neither (a) nor (b)
2. DES has an initial an nd final permutation block and __ ________ rounds A. 14 B. 15 C. 16 D. none of the above
3. The DES function ha as _______ components A. 2 B. 3 C. 4 D. 5
4. DES uses a key geneerator to generate sixteen _______ round keys A. 32-bit B. 48-bit C. 54-bit D. 42-bit
d to increase the size of the DES key 5. ________ DES was designed A. Double B. Triple C. Quadruple
Downlloaded from www.examradar.com
D. none of the above
6. _______ is a round cipher c based on the Rijndael algorrithm that uses a 128-bit block of data d A. AEE B. AED C. AER D. AES
7. AES has _____ different configurations A. two B. three C. four D. five
_ ciphers 8. ECB and CBC are ________ A. block B. stream C. field D. none of the above
d public-key cryptography method d is the 9. One commonly used ______ algorithm A. RSS B. RAS C. RSA D. RAA
Downlloaded from www.examradar.com
10. The ________ meth hod provides a one-time session keey for two parties A. Diffie-Hellman B. RSA C. DES D. AES
Answer key for MCQ SET- 3 Q-1 Q-2 Q-3 Q-4 Q-5 Q-6 Q-7 Q-8 Q-9 Q-10
Correc ct Answer :symmetric-key Correc ct Answer :16 Correc ct Answer :4 Correc ct Answer :48-bit Correc ct Answer :Triple Correc ct Answer :AES Correc ct Answer :three Correc ct Answer :block Correc ct Answer :RSA Correc ct Answer :Diffie-Hellman...