Question Paper Set 1
1. What does the OSI Security Architecture primarily define?
- A) Network protocols
- B) Security services and mechanisms
- C) Application layer standards
- D) Physical layer specifications
2. Which of the following is NOT a security service?
- A) Authentication
- B) Integrity
- C) Availability
- D) Compression
3. What is the goal of a security mechanism?
- A) To define network topologies
- B) To detect network anomalies
- C) To implement security services
- D) To optimize network performance
4. Which OSI layer is responsible for end-to-end data encryption?
- A) Transport Layer (Layer 4)
- B) Data Link Layer (Layer 2)
- C) Network Layer (Layer 3)
- D) Physical Layer (Layer 1)
5. What type of attack aims to modify message content without detection?
- A) Denial-of-Service (DoS)
- B) Man-in-the-Middle (MitM)
- C) Replay attack
- D) Integrity attack
6. Which encryption technique involves substitution and permutation?
- A) Stream ciphers
- B) Block ciphers
- C) RSA algorithm
- D) Diffie-Hellman key exchange
7. What does AES stand for in cryptography?
- A) Advanced Encryption System
- B) American Encryption Standard
- C) Advanced Encryption Standard
- D) American Encryption System
8. How many rounds does AES typically use for encryption?
- A) 12
- B) 10
- C) 8
- D) 14
9. What is the primary advantage of using Triple DES over DES?
- A) Higher encryption speed
- B) Increased key length
- C) Reduced vulnerability to attacks
- D) Compatibility with older systems
10. Which mode of operation does not require an initialization vector (IV)?
- A) CBC (Cipher Block Chaining)
- B) ECB (Electronic Codebook)
- C) CTR (Counter)
- D) OFB (Output Feedback)
11. What is the primary purpose of Diffie-Hellman key exchange?
- A) To securely exchange encryption keys
- B) To authenticate users in a network
- C) To verify the integrity of messages
- D) To encrypt data streams
12. In public-key cryptography, who publishes the public key?
- A) Sender only
- B) Receiver only
- C) Both sender and receiver
- D) Certification authority
13. Which key management method ensures secure distribution of keys?
- A) Diffie-Hellman key exchange
- B) Public-Key Infrastructure (PKI)
- C) RSA encryption
- D) AES encryption
14. What is the purpose of a Message Authentication Code (MAC)?
- A) To encrypt messages
- B) To verify the authenticity of a message
- C) To generate digital signatures
- D) To compress data
15. Which of the following is a cryptographic hash function?
- A) DES
- B) RSA
- C) HMAC
- D) Diffie-Hellman
16. What property of hash functions makes them suitable for message integrity?
- A) Collision resistance
- B) Key length
- C) Speed of computation
- D) Symmetric encryption
17. Which algorithm is used for hashing in the Secure Hash Algorithm (SHA-256)?
- A) MD5
- B) SHA-1
- C) SHA-256
- D) HMAC
18. What does HMAC stand for?
- A) Hashed Message Authentication Code
- B) Hashing Mechanism for Authentication Codes
- C) Hash-based Message Authentication Code
- D) High-level Message Authentication Code
19. Which security feature ensures that a hash function cannot be reversed?
- A) One-way function
- B) Symmetric encryption
- C) Public-key cryptography
- D) Steganography
20. Which technique hides the existence of secret information within innocuous carriers?
- A) Encryption
- B) Hashing
- C) Steganography
- D) Compression
Question Paper Set 2
1. What does the OSI Security Architecture primarily define?
- A) Network protocols
- B) Security services and mechanisms
- C) Application layer standards
- D) Physical layer specifications
2. Which of the following is NOT a security service?
- A) Authentication
- B) Integrity
- C) Availability
- D) Compression
3. What is the goal of a security mechanism?
- A) To define network topologies
- B) To detect network anomalies
- C) To implement security services
- D) To optimize network performance
4. Which OSI layer is responsible for end-to-end data encryption?
- A) Transport Layer (Layer 4)
- B) Data Link Layer (Layer 2)
- C) Network Layer (Layer 3)
- D) Physical Layer (Layer 1)
5. What type of attack aims to modify message content without detection?
- A) Denial-of-Service (DoS)
- B) Man-in-the-Middle (MitM)
- C) Replay attack
- D) Integrity attack
6. Which encryption technique involves substitution and permutation?
- A) Stream ciphers
- B) Block ciphers
- C) RSA algorithm
- D) Diffie-Hellman key exchange
7. What does AES stand for in cryptography?
- A) Advanced Encryption System
- B) American Encryption Standard
- C) Advanced Encryption Standard
- D) American Encryption System
8. How many rounds does AES typically use for encryption?
- A) 12
- B) 10
- C) 8
- D) 14
9. What is the primary advantage of using Triple DES over DES?
- A) Higher encryption speed
- B) Increased key length
- C) Reduced vulnerability to attacks
- D) Compatibility with older systems
10. Which mode of operation does not require an initialization vector (IV)?
- A) CBC (Cipher Block Chaining)
- B) ECB (Electronic Codebook)
- C) CTR (Counter)
- D) OFB (Output Feedback)
11. What is the primary purpose of Diffie-Hellman key exchange?
- A) To securely exchange encryption keys
- B) To authenticate users in a network
- C) To verify the integrity of messages
- D) To encrypt data streams
12. In public-key cryptography, who publishes the public key?
- A) Sender only
- B) Receiver only
- C) Both sender and receiver
- D) Certification authority
13. Which key management method ensures secure distribution of keys?
- A) Diffie-Hellman key exchange
- B) Public-Key Infrastructure (PKI)
- C) RSA encryption
- D) AES encryption
14. What is the purpose of a Message Authentication Code (MAC)?
- A) To encrypt messages
- B) To verify the authenticity of a message
- C) To generate digital signatures
- D) To compress data
15. Which of the following is a cryptographic hash function?
- A) DES
- B) RSA
- C) HMAC
- D) Diffie-Hellman
16. What property of hash functions makes them suitable for message integrity?
- A) Collision resistance
- B) Key length
- C) Speed of computation
- D) Symmetric encryption
17. Which algorithm is used for hashing in the Secure Hash Algorithm (SHA-256)?
- A) MD5
- B) SHA-1
- C) SHA-256
- D) HMAC
18. What does HMAC stand for?
- A) Hashed Message Authentication Code
- B) Hashing Mechanism for Authentication Codes
- C) Hash-based Message Authentication Code
- D) High-level Message Authentication Code
19. Which security feature ensures that a hash function cannot be reversed?
- A) One-way function
- B) Symmetric encryption
- C) Public-key cryptography
- D) Steganography
20. Which technique hides the existence of secret information within innocuous carriers?
- A) Encryption
- B) Hashing
- C) Steganography
- D) Compression
Question Paper Set 3
1. What does the OSI Security Architecture primarily define?
- A) Network protocols
- B) Security services and mechanisms
- C) Application layer standards
- D) Physical layer specifications
2. Which of the following is NOT a security service?
- A) Authentication
- B) Integrity
- C) Availability
- D) Compression
3. What is the goal of a security mechanism?
- A) To define network topologies
- B) To detect network anomalies
- C) To implement security services
- D) To optimize network performance
4. Which OSI layer is responsible for end-to-end data encryption?
- A) Transport Layer (Layer 4)
- B) Data Link Layer (Layer 2)
- C) Network Layer (Layer 3)
- D) Physical Layer (Layer 1)
5. What type of attack aims to modify message content without detection?
- A) Denial-of-Service (DoS)
- B) Man-in-the-Middle (MitM)
- C) Replay attack
- D) Integrity attack
6. Which encryption technique involves substitution and permutation?
- A) Stream ciphers
- B) Block ciphers
- C) RSA algorithm
- D) Diffie-Hellman key exchange
7. What does AES stand for in cryptography?
- A) Advanced Encryption System
- B) American Encryption Standard
- C) Advanced Encryption Standard
- D) American Encryption System
8. How many rounds does AES typically use for encryption?
- A) 12
- B) 10
- C) 8
- D) 14
9. What is the primary advantage of using Triple DES over DES?
- A) Higher encryption speed
- B) Increased key length
- C) Reduced vulnerability to attacks
- D) Compatibility with older systems
10. Which mode of operation does not require an initialization vector (IV)?
- A) CBC (Cipher Block Chaining)
- B) ECB (Electronic Codebook)
- C) CTR (Counter)
- D) OFB (Output Feedback)
11. What is the primary purpose of Diffie-Hellman key exchange?
- A) To securely exchange encryption keys
- B) To authenticate users in a network
- C) To verify the integrity of messages
- D) To encrypt data streams
12. In public-key cryptography, who publishes the public key?
- A) Sender only
- B) Receiver only
- C) Both sender and receiver
- D) Certification authority
13. Which key management method ensures secure distribution of keys?
- A) Diffie-Hellman key exchange
- B) Public-Key Infrastructure (PKI)
- C) RSA encryption
- D) AES encryption
14. What is the purpose of a Message Authentication Code (MAC)?
- A) To encrypt messages
- B) To verify the authenticity of a message
- C) To generate digital signatures
- D) To compress data
15. Which of the following is a cryptographic hash function?
- A) DES
- B) RSA
- C) HMAC
- D) Diffie-Hellman
16. What property of hash functions makes them suitable for message integrity?
- A) Collision resistance
- B) Key length
- C) Speed of computation
- D) Symmetric encryption
17. Which algorithm is used for hashing in the Secure Hash Algorithm (SHA-256)?
- A) MD5
- B) SHA-1
- C) SHA-256
- D) HMAC
18. What does HMAC stand for?
- A) Hashed Message Authentication Code
- B) Hashing Mechanism for Authentication Codes
- C) Hash-based Message Authentication Code
- D) High-level Message Authentication Code
19. Which security feature ensures that a hash function cannot be reversed?
- A) One-way function
- B) Symmetric encryption
- C) Public-key cryptography
- D) Steganography
20. Which technique hides the existence of secret information within innocuous carriers?
- A) Encryption
- B) Hashing
- C) Steganography
- D) Compression