0% found this document useful (0 votes)
137 views6 pages

CNS MCQ Unit-I

Uploaded by

sridharan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
137 views6 pages

CNS MCQ Unit-I

Uploaded by

sridharan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

NETWORK SECURITY AND CRYPTOGRAPHY

Unit – I (MCQ)

1. What is the primary goal of cryptography?

A) Data compression B) Data integrity C) Data encryption D) Data storage

Answer: C) Data encryption

2. Which of the following is an example of a passive attack?

A) Denial-of-service attack B) Man-in-the-middle attack

C) Eavesdropping D) SQL injection attack

Answer: C) Eavesdropping

3. What is the primary goal of a passive attack?

A) To disrupt network communication B) To intercept sensitive information

C) To manipulate data in transit D) To impersonate a legitimate user

Answer: B) To intercept sensitive information

4. Which attack attempts to disrupt the availability of a service or system?

A) Passive attack B) Active attack C) DoS (Denial-of-Service) attack D) Spoofing attack

Answer: C) DoS (Denial-of-Service) attack

5. Which security service ensures that legitimate users have uninterrupted access to data and
resources?

A) Authentication B) Authorization C) Availability D) Non-repudiation

Answer: C) Availability

6. Which security service is concerned with protecting data from unauthorized modification
or deletion?

A) Confidentiality B) Integrity C) Availability D) Authentication

Answer: B) Integrity

7. Which of the following is a characteristic of stream ciphers?

A) They operate on fixed-size blocks of plaintext

B) They are primarily used for digital signatures

C) They generate a continuous stream of key bits

D) They use a complex substitution-permutation network


Answer: C) They generate a continuous stream of key bits

8. In a stream cipher, how is encryption typically performed?

A) Block by block B) Bit by bit

C) Using modular arithmetic D) Using matrix multiplication

Answer: B) Bit by bit

9. What is the output of a stream cipher called?

A) Ciphertext B) Keystream C) Initialization vector (IV) D) Plaintext

Answer: B) Keystream

10. What is the primary characteristic of a block cipher?

A) It encrypts and decrypts data one bit at a time

B) It uses a stream of key bits to encrypt data

C) It operates on fixed-size blocks of data

D) It generates a continuous stream of ciphertext

Answer: C) It operates on fixed-size blocks of data

11. In which mode of operation does each plaintext block get XORed with the previous
ciphertext block before encryption?

A) Cipher Feedback (CFB) B) Output Feedback (OFB)

C) Counter (CTR) D) Cipher Block Chaining (CBC)

Answer: D) Cipher Block Chaining (CBC)

12. Which block cipher mode uses a counter to generate a unique keystream for each
plaintext block?

A) Electronic Codebook (ECB) B) Cipher Block Chaining (CBC)

C) Output Feedback (OFB) D) Counter (CTR)

Answer: D) Counter (CTR)

13. Which block cipher mode is vulnerable to errors in ciphertext propagation?

A) Electronic Codebook (ECB) B) Cipher Block Chaining (CBC)

C) Output Feedback (OFB) D) Counter (CTR)

Answer: B) Cipher Block Chaining (CBC)


14. Which key cryptosystem uses the same key for both encryption and decryption?

A) Symmetric-key cryptosystem B) Asymmetric-key cryptosystem

C) Hybrid cryptosystem D) Public-key cryptosystem

Answer: A) Symmetric-key cryptosystem

15. In a symmetric-key cryptosystem, how many keys are shared between communicating
parties?

A) One key B) Two keys C) Three keys D) Four keys

Answer: A) One key

16. Which key cryptosystem uses different keys for encryption and decryption?

A) Symmetric-key cryptosystem B) Asymmetric-key cryptosystem

C) Hybrid cryptosystem D) Public-key cryptosystem

Answer: B) Asymmetric-key cryptosystem

17. In an asymmetric-key cryptosystem, how many keys does each user have?

A) One key B) Two keys C) Three keys D) Four keys

Answer: B) Two keys

18. Which asymmetric-key algorithm is commonly used for secure key exchange and digital
signatures?

A) RSA B) AES C) DES D) Blowfish

Answer: A) RSA

19. What is the block size of DES?

A) 64 bits B) 128 bits C) 256 bits D) 512 bits

Answer: A) 64 bits

20. How many rounds of encryption does DES perform?

A) 16 rounds B) 32 rounds C) 48 rounds D) 64 rounds

Answer: A) 16 rounds

21. DES uses a key size of:

A) 56 bits B) 64 bits C) 128 bits D) 256 bits

Answer: A) 56 bits
22. Triple DES (3DES) involves performing DES encryption how many times?

A) Once B) Twice C) Three times D) Four times

Answer: C) Three times

23. What is the effective key size of Triple DES (3DES) when using three 56-bit keys?

A) 56 bits B) 112 bits C) 168 bits D) 192 bits

Answer: B) 112 bits

24. What is the main advantage of Triple DES (3DES) over DES?

A) Faster encryption speed B) Stronger security due to longer key size

C) Simpler key management D) Resistance to differential cryptanalysis

Answer: B) Stronger security due to longer key size

25. What is the block size of AES?

A) 64 bits B) 128 bits C) 192 bits D) 256 bits

Answer: B) 128 bits

26. AES supports key sizes of:

A) 56 bits, 128 bits, and 256 bits B) 64 bits, 128 bits, and 192 bits

C) 128 bits, 192 bits, and 256 bits D) 128 bits, 256 bits, and 512 bits

Answer: C) 128 bits, 192 bits, and 256 bits

27. AES operates on how many rounds of encryption depending on the key size?

A) 8, 12, or 16 rounds B) 16 rounds C) 32 rounds D) 64 rounds

Answer: A) 8, 12, or 16 rounds

28. What is the block size of IDEA?

A) 64 bits B) 128 bits C) 192 bits D) 256 bits

Answer: A) 64 bits

29. IDEA uses a key size of:

A) 56 bits B) 64 bits C) 128 bits D) 256 bits

Answer: B) 128 bits


30. What is the block size of Blowfish?

A) 64 bits B) 128 bits C) 192 bits D) 256 bits

Answer: A) 64 bits

31. Blowfish supports key sizes ranging from:

A) 56 bits to 128 bits B) 64 bits to 256 bits C) 128 bits to 448 bits D) 256 bits to 1024 bits

Answer: C) 32 bits to 448 bits

32. RC5 is a symmetric-key block cipher designed by:

A) Ron Rivest B) Bruce Schneier C) Whitfield Diffie D) Martin Hellman

Answer: A) Ron Rivest

33. What is the block size of RC5?

A) 64 bits B) 128 bits C) 256 bits D) Variable, depending on configuration

Answer: D) Variable, depending on configuration

34. Which of the following modes of operation is commonly associated with RC5 for
encryption?

A) Electronic Codebook (ECB) B) Cipher Block Chaining (CBC)

C) Output Feedback (OFB) D) Counter (CTR)

Answer: A) Electronic Codebook (ECB)

35. In RC5, the word size w typically refers to:

A) The number of rounds B) The block size

C) The key size D) The size of the machine word used in computations

Answer: D) The size of the machine word used in computations


Unit – I (5 Marks)

1. Discuss about Security services.


2. Discuss about Stream cipher.
3. Write note on Trible DES.
4. Discuss about RC5 Algorithms
5. Discuss about the Blowfish encryption model.

Unit – I (9 Marks)

1. Explain briefly about Security attacks.


2. Explain the Block cipher model.
3. Explain briefly about Symmetric-key and Asymmetric-key Cryptosystem
4. Describe about the DES.
5. Explain briefly about the AES.
6. Explain briefly about IDEA

You might also like