Aspire College Hafizabad
(JANUARY-2024)
BS (IT) (7th Semester)
Subject: Information Security Date: ____ / ____ / ______
Total Marks: 25 Time: 01:00 Hour
Name: __________________ Roll No.:__________
----------------------------------------------------------------------------------------------------------------
Objective Type
Section A: Multiple Choice Questions (5 Marks)
Each question carries 1 mark.
1. What is the main goal of information security? a) Data analysis
b) Ensuring data confidentiality, integrity, and availability
c) System upgrade
d) Software development
2. Which of the following is a key characteristic of symmetric encryption? a) Public and private key
pair
b) Uses the same key for encryption and decryption
c) Key is never shared
d) One-way operation only
3. Asymmetric encryption is also known as: a) Private key cryptography
b) Secret key cryptography
c) Public key cryptography
d) One-time pad cryptography
4. Which of the following best describes a hash function? a) A reversible process to secure data
b) A process that converts data into a fixed-size string of characters
c) A method to generate encryption keys
d) A type of malware
5. A significant drawback of symmetric encryption is: a) Slow processing speed
b) Large key sizes
c) The need to securely share the key
d) Incompatibility with digital signatures
Section B: Long Questions (20 Marks)
1. (10 Marks)
Explain the differences between symmetric and asymmetric encryption. Include their advantages,
disadvantages, and examples of where each is commonly used.
2. (10 Marks)
What is a hash function? Describe its role in information security and provide an example of a real-
world application where hash functions are used.
******************************************