0% found this document useful (0 votes)
201 views1 page

Cryptography & Network Security MCQs

This document contains a multiple choice quiz on cryptography and network security topics. The quiz questions cover principles of cryptography like confidentiality and authentication, types of ciphers like book ciphers and rail fence ciphers, the process of decryption, how diffusion and confusion increase redundancy in plain text, details of DES encryption, the location of the SSL layer, that firewalls are a type of router, that proxy servers provide more security than packet filters, that asymmetric key cryptography uses two keys per communicating party, that in secure communication party B should not know party A's private key, that authentication ensures a message was sent by the actual sender, that traffic analysis is a passive attack, and that the public key is used for encryption in public key
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
201 views1 page

Cryptography & Network Security MCQs

This document contains a multiple choice quiz on cryptography and network security topics. The quiz questions cover principles of cryptography like confidentiality and authentication, types of ciphers like book ciphers and rail fence ciphers, the process of decryption, how diffusion and confusion increase redundancy in plain text, details of DES encryption, the location of the SSL layer, that firewalls are a type of router, that proxy servers provide more security than packet filters, that asymmetric key cryptography uses two keys per communicating party, that in secure communication party B should not know party A's private key, that authentication ensures a message was sent by the actual sender, that traffic analysis is a passive attack, and that the public key is used for encryption in public key
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Multiple Choice Questions - Cryptography and Network Security (CS-801D)

1. Choose correct alternatives for the following:


i) Four primary security principles related to a message are
a) confidentiality, authentication, integrity and non-repudiation
b) confidentiality, access control, non-repudiation and integrity
c) authentication, authorization, non-repudiation and availability
d) availability, access control, authorization and authentication.
ii) Book Cipher is also called as
a) Rail-Fence Technique
c) Mono-alphabetic Cipher

b) One-time pad
d) Running Key Cipher

iii) Conversion of cipher text into plain text is called as


a) encryption
b) decryption
c) cryptography
d) cryptanalyst
iv) Redundancy of plain text increased by
a) Confusion
b) Diffusion
c) Both confusion and diffusion
d) Neither confusion nor diffusion
v) Bits contain in DES encrypts blocks
a) 32
b) 56

c) 64

d) 128

vi) SSL (Secure Socket Layer) layer is located between


a) transport layer, network layer
b) application layer, transport layer
c) data link layer, physical layer
d) network layer, data link layer
vii) Firewall is a specialized form of a
a) bridge
b) disk

c) printer

d) router

viii) Application gateways (proxy servers) are ______________ packet filters


a) less secure than
b) more secure than
c) equally secure to
d) slower
ix) In asymmetric key cryptography ____ keys are required per communicating party
a) 2
b) 3
c) 4
d) 5
x) If A and B want to communicate securely with each other, B must not know
a) As private key
b) As public key
c) Bs private key
d) Bs public key
xi) _________ ensures that a message was received by the receiver from the actual sender and not from an
attacker.
a) Authentication
b) Authorization
c) Integration
d) None of these.
xii) Which of the following is a passive attack?
a) Masquerade
c) Denial of service

b) Replay
d) Traffic analysis

xiii) In public-key cryptography, ___________ key is used for encryption


a) public
b) private
c) both (a) and (b)

d) shared

You might also like