0% found this document useful (0 votes)
32 views2 pages

Prof. Fiza English 1st .

Uploaded by

Assad Leo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views2 pages

Prof. Fiza English 1st .

Uploaded by

Assad Leo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Aspire College Hafizabad

(JANUARY-2024)
BS (IT) (7th Semester)
Subject: Information Security Date: ____ / ____ / ______
Total Marks: 25 Time: 01:00 Hour
Name: __________________ Roll No.:__________
----------------------------------------------------------------------------------------------------------------
Objective Type

Section A: Multiple Choice Questions (5 Marks)

Each question carries 1 mark.

1. What is the main goal of information security? a) Data analysis


b) Ensuring data confidentiality, integrity, and availability
c) System upgrade
d) Software development

2. Which of the following is a key characteristic of symmetric encryption? a) Public and private key
pair
b) Uses the same key for encryption and decryption
c) Key is never shared
d) One-way operation only

3. Asymmetric encryption is also known as: a) Private key cryptography


b) Secret key cryptography
c) Public key cryptography
d) One-time pad cryptography

4. Which of the following best describes a hash function? a) A reversible process to secure data
b) A process that converts data into a fixed-size string of characters
c) A method to generate encryption keys
d) A type of malware

5. A significant drawback of symmetric encryption is: a) Slow processing speed


b) Large key sizes
c) The need to securely share the key
d) Incompatibility with digital signatures
Section B: Long Questions (20 Marks)

1. (10 Marks)
Explain the differences between symmetric and asymmetric encryption. Include their advantages,
disadvantages, and examples of where each is commonly used.
2. (10 Marks)
What is a hash function? Describe its role in information security and provide an example of a real-
world application where hash functions are used.

******************************************

You might also like