1.
A substitution cipher substitute’s one symbol with [b ]
(a) Keys (b) Others
(c) Multi Parties (d) Single Party
2. [ c]
We use Cryptography term to transforming messages to make them secure
and immune to
(a)Change (b)Idle
(c)Attacks (d)Defend
3. [a ]
In cryptography ,what is cipher?
(a) Algorithm for performing encryption and decryption
(b) encrypted message (c)Both A & B (d) None of the
mentioned
4. In cryptography, the order of the letters in a message is rearranged by [ a]
(a) Transposition Cipher (b)Substitution Ciphers
(c)Both A&B (d)None of the mentioned
5. [ a]
Man-in-the-middle attack can endanger security of Diffie-
Hellman method if two parties are not
(a) Authenticated (b) Joined
(c) Submit (d) Separate
6. [c ]
Which one of the following algorithm is not used in asymmetric-key
cryptography?
(a) RSA Algorithm (b)Diffie-Hellman
(c)l Electronic code Book Algorithm (d)None of the mentioned
7. [b ]
An asymmetric-key(or public-key)cipher uses
(a)1Key (b)2Key
(c)3 key (d) None
8. [c ]
A straight permutation cipher or a straight P-box has same number of
inputs as
(a) Cipher (b)Frames
(c)Outputs (d) None
9. The original message digest algorithm is called as . [ c]
(a) MAC (b)SHA
(c)MD (d)DSA
10. The MD5 is a message digest algorithm developed by . [ a]
(a) Ron Rivest (b)White Field Diffie
(c)Martin Hellman (d)Diffie-Hellman
1. In CIA Triad ‘A’ stands for [ a]
(a) Availability (b) Authentication
(c) Authorization (d) Attack
2. How many transposition techniques are there [ ]
(a)2 (b) 1
(c)3 (d)4
3. Is a possible danger that might exploit a vulnerability to breach security [a ]
and thus cause possible harm.
(a) Threat (b) Attack
(c)Both (d) None
4. Technique in which the letters of the plain text are replaced by other [ c]
letters or by numbers or symbols.
(a) Stegnography (b) Cryptography
(c)Substitution (d) Transposition
5. An asymmetric-key(or public-key)cipher uses [ b]
(a)1Key (b)2Key
(c)3 key (d) None
6. IDEA is a _______ type of algorithm [ a]
(a)Block cipher (b) Stream cipher
(c)Both (d) None
7. What is the key size of DES algorithm [ a]
(a) 56 (b) 64
(c)48 (d) 128
8. What is the key size of AES algorithm [ d]
(b) 56 (b) 64
(c)48 (d) 128
9. Helps in ensuring non-fraudulent transactions on the web. [a ]
(a)Certificate authority (b)Digital authority
(c)Dual authority (d)Digital signature
10. Digital signature envelope is
[b ]
decrypted by using
(a)Merchant private key (b)Payment’s private key
(c)Payment public key (d)Merchant’s public key
1. This principle ensures only sender and receiver have access to the message [ a ]
(a) confidentiality (b) authentication
(c)integrity (d) access control
2. If the recipient of a message has to be satisfied with identity of sender [ b ]
(a) confidentiality (b) authentication
(c)integrity (d) access control
3. The contents of a message must not be modified while in transit the principle is [ a ]
(a) confidentiality (b) authentication
(c)integrity (d) access control
4. Sender of message later cannot claim that message was never sent by him [ d ]
(a) confidentiality (b) authentication
(c)integrity (d) non repudiation
5. In this type of attack there is no modification to message contents [ a ]
(a) passive (b) active
(c) both a and b (d) none of the above
6. Caesar cipher is an example of [ a ]
(a) substitution cipher (b) transposition cipher
(c) both a & b (d)none of the above
7. One-time pad is an example of [ ]
(a) substitution cipher (b) transposition cipher
(c) both a & b (d)none of the above
8. Rail fence technique is an example of [ b]
(a) substitution cipher (b) transposition cipher
(c) both a & b (d)none of the above
9. One bit of plain text is encrypted at a time [ a ]
(a)stream cipher (b)block cipher
(c) both a & b (d) none of the above
10 One block of plain text is encrypted at a time [ b ]
.
(a)stream cipher (b)block cipher
(c) both a & b (d) none of the above
1. This attack is related to confidentiality [ a]
(a) interception (b) fabrication
(c) modification (d)interruption
2. This attack is related to authentication [ b ]
(a) interception (b) fabrication
(c) modification (d)interruption
3. This attack is related to integrity [ c ]
(a) interception (b) fabrication
(c) modification (d)interruption
4. This attack is related to availability [ d ]
(a) interception (b) fabrication
(c) modification (d)interruption
5. In this type of attacks ,there is no modification to message contents [a ]
(a)passive (b)active
(c) both a&b (d) none of the above
6. In this type of attacks , message contents are modified [ b ]
(a)passive (b)active
(c) both a&b (d) none of the above
7. Number of rounds in DES algorithm [ a ]
(a) 16 (b) 17
(c) 52 (d) 48
8. If number of rounds in AES is 12 then key size is [ a ]
(a) 192 (b) 256
(c) 128 (d) 512
9. The contents of a message must not be modified while in transit the principle is [ a ]
(a) confidentiality (b) authentication
(c)integrity (d) non repudiation
10 Sender of message later cannot claim that message was never sent by him [ d ]
.
(a) confidentiality (b) authentication
(c)integrity (d) non repudiation
II. Fill in the blanks
11. DES encrypts blocks of ___64____bits
12.DES after encryption gets cipher text of _____64____bits.
13. AES encrypts plain text of size______128___bits.
14. after encryption AES gets output cipher text of _____128__bits.
15. number of rounds in DES algorithm___16____.
16. if key size in AES is 128 bits then number of rounds is ____10___.
17. if we are using same key for encryption and decryption then it is
_____________symmetric encryption_______________.
18. if we are using one key for encryption and different key for decryption
then it is Called __________asymmetric encryption__________________.
19. IDEA Algorithm takes input plain text of________64____bits.
20. if key size in AES is 192 bits then number of rounds is __12_______.
11. confidentiality means _______preserving authorized restrictions on
access and disclosure, including means for protecting personal
privacy and proprietary information.
_____________________________________________.
12.integrity means________________data is complete, trustworthy and
has not been modified or accidentally altered by an unauthorised
user __________________________________________.
13. authentication means__________used by a server when the server
needs to know exactly who is accessing their information or site.
__________________________________________.
14. non repudiation means_______________assurance that someone
cannot deny the validity of something.
___________________________________.
15. the process of converting plain text into cipher text is
called__________encryption________.
16. if we are encrypting and decrypting message with same key it is called
_______symmetric_____________cryptography.
17. if different keys are used for encrypting and decrypting then it is called
____________asymmetric_________________cryptography.
18. symmetric key cryptography is also called_______________private key
cryptography____________.
19. Assymmetric key cryptography is also called________________public key
cryptography__________.
20. RC4 is a __________stream_________cipher.
11. _________________security mechanism__________mechanism that is
designed to detect, prevent or recover from a security attack.
12. Any action that compromises the security of information owned by an organization is
security attach___
13._________threat______is a possible danger that might exploit a vulnerability to
breach security and thus cause possible harm.
14. A masquerade takes place when one entity pretends to be a different entity.
15. In RSA algorithm cipher text c =
16.________________cryptology__________is the study of cryptography and cryptanalysis
together.
17. A primality testing is a test to determine whether or not a given number is prime.
18. In public key cryptography, ___two__________keys are used.
19. MAC stands for____________message authentication code_____________________
20.SHA Stands for ________Secure hash algorithm_________
11 ._____active_____________attacks involve modification of contents
12. ________________passive_________ attacks can’t be noticed.
13. _____________transposition_______technique in which performs some sort of
permutation on the plaintext.
Letters
14.______________substitution______________technique in which the letters of the plain text are
replaced by other letters or by numbers or symbols
15.______________steganography________is a technique for hiding the original message
16. _____________asymmetric________encryption algorithms make use of two keys one for
encryption and other for decryption.
17.A ___stream___cipher is one that encrypts a digital data stream one bit or one
byte at a time.
18.A____________block_______is one in which a block of plain text is treated as a
whole and used to produce a cipher text block of equal block
19.RC5 is a _______________symmetric key-block________ cipher mode of algorithm.
20.Attacks on MAC are ________________________
21. A hash function accepts a variable size message as input and produces a _fixed
size output