Multiple Choice Questions
1. Is To Protect Data And Passwords
A.
Encryption
B. Authentication
C.
Authorization
D.
Non Repudiation
2. Prevents Either Sender Or Receiver From Denying A Transmitted Message
A. Non Repudiation
B. Data Integrity
C. Active Attack
D. Passive Attack
3. In Playfair cipher
technique combining i&j,
if PT = MYNAMEISATUL and Keyword = PLAYFAIREXAMPLE, CT=
A. XFOLXRMKPVLR
B. XFOLIXMKPVLR
C. XFOLXRMKPVRL
D. XFOLIXMKPVRL
4. In which the intruder observe the pattern of the message from sender to receiver.
A. Replay
B. Denial of service
C. Masquerade
D. Traffic analysis
5. In Rail fence of depth 2, the ciphertext of PT :- we are TE students is
A.
WAEETDNSERTSUET
B.
WREUNEESDTATTES
C.
WAEETDNSERTSUTE
D. None of these
6. A process that is designed to detect, prevent or recover is called as
A. Security Mechanism
B.
None of
these
C.
Security Attack
D. Security Service
7. Protection of all user data in single data block is done by which service.
A. Repudiation
B. Integrity
C. Connectionless confidentiality
D. Both a&b
8. The Vernam Cipher is also called as
A. polyalphabetic
B. Caesar
C. Hill cipher
D. One time Pad
9. In pervasive mechanism refers to data collected and potentially used to facilitate a security audit.
A.
security recovery
B. event detection
C. security audit trail
D.
all the above
10. ------------ integrity provide selective fields within user.
A. selective field connection integrity
B. connectionless integrity
C. connection connection integrity
D. all the above
11. In data encryption standard ,S boxes each of which accepts bits as input and produces bits as output.
A. 3,2
B. 2,2
C. 6,4
D. 8,8
12. In data encryption algorithm bit key is used as input.
A. 32
B. 48
C. 8
D. 64
13. In case of avalanche effect a change in one bit of the plain text or one bit of the key should produce a change in ……… bits of the ciphertext.
A. many
B. three
C. two
D. one
14. In DES algorithm, Each row of an S box defines a general substitution
A. irreversible
B. none of the above
C. both a&b
D. reversible
15. In data encryption standard algorithm is produced by the combination of left circular shift and permutation.
A. subkey(ki)
B. private key
C. public key
D. secrete key
Descriptive Questions
Q.1. Explain different types of attacks with examples?
Q.2 Explain X.800 Security services?
Q.3 Explain X.800 Security Mechanisms.?
Q.4. Explain the model of a conventional cryptosystem?
Q.5 Explain the Play fair cipher with an example?
Q.6. Explain Transposition Techniques with Examples?
Q.7. Explain a single round of the DES algorithm?
Q.8. Explain Hill Cipher with an Example?
Q.9. Explain a model for network security with a neat diagram.
Q.10. What is the substitution technique? Explain Caesar, monoalphabetic cipher?
👍
ReplyDeletePost a Comment