0% found this document useful (0 votes)
9 views9 pages

MCQ Quiz III (Ans)

Uploaded by

Kh ine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views9 pages

MCQ Quiz III (Ans)

Uploaded by

Kh ine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

The Input message in Cryptography is called _________.

A) plaintext
B) ciphertext
C) plain and cipher
D) none of the above
ANSWER: A
Transposition cipher key is _________ bits long.
A) log2 n!
B) log2 (2n)!
C) Antilog2 n!
D) Antilog2 (2n)!
ANSWER: A
Stream ciphers are _________ than block ciphers.
A) slower
B) better
C) faster
D) longer
ANSWER: C
For the Knapsack: { 1 6 8 15 24} , Find the ciphertext value for the plaintext 10011.
A) 40
B) 22
C) 31
D) 47
ANSWER: A
SDES uses a key generator to generate two _________ round key.
A) 32-bit
B) 16-bit
C) 10-bit
D) 8-bit
ANSWER: D
Digital signature can provide ________ for the message.
A) integrity
B) authentication
C) nonrepudiation
D) all of them
ANSWER: D
All cryptographic hash functions need to create a fixed-size digest out of a _________message.
A) variable-size
B) arbitrary length
C) fixed-size
D) long-size
ANSWER: A
A(n) ________ is a federal or state organization that binds a public key to an entity and issues a
certificate.
A) KDC
B) Kerberos
C) CA
D) X)509
ANSWER: C
CMS stands for
A) Content Message Syntax
B) Cipher Message Syntax
C) Cryptographic Message Syntax
D) Cyber Message Syntax
ANSWER: C
WPA2 is used for security in _______.
A) Ethernet
B) bluetooth
C) wi-fi
D) e-mail
ANSWER: C
In general, one attack threatening the availability of information is _________.
A) replaying
B) masquerading
C) denial of service
D) traffic analysis
ANSWER: C
In _________ mode, encipherment and decipherment use the encryption function of the underlying
block cipher.
A) ECB
B) CBC
C) CTR
D) CFB
ANSWER:D
To be resistant to exhaustive-search attack, a modern block cipher needs to be designed as a _________
cipher.
A) substitution
B) transposition
C) affine
D) multiplicative
ANSWER: A
Symmetric-key cryptography uses a single _________for both encryption and decryption.
A) public key
B) private key
C) secret key
D) encrypt key
ANSWER: C
The number of rounds in DES is
A) 15
B) 16
C) 30
D) 32
ANSWER: B
________ ensure that Eve cannot find two messages that hash to the same digest.
A) Preimage Resistance
B) Second Preimage Resistance
C) Collision Resistance
D) Collect Resistance
ANSWER: C
A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
A) KDC
B) CA
C) KDD
D) KMS
ANSWER: A
PGP encrypts data by using a block cipher called ______.
A) international data encryption algorithm
B) private data encryption algorithm
C) internet data encryption algorithm
D) local data encryption algorithm
ANSWER: A
In asymetric-key cryptography, people do not need to know a_________.
A) symmetric shared key
B) public key
C) private key
D) security key
ANSWER: D
In tunnel mode, IPSec protects the ______.
A) Entire IP packet
B) IP header
C) IP payload
D) IP trailer
ANSWER: A
What is the primary goal of transposition in classical cryptography?
A) Replacing characters with others
B) Rearranging the order of characters
C) Encrypting data with multiple keys
D) Increasing the key size
ANSWER: B
___________ means that changes need to be done only by authorized enities and through authorized
mechanisms.
A) Confidentiality
B) Integrity
C) Availability
D) None of the above
ANSWER: B
The additive inverse of 13 in modulus 100 is
A) 67
B) 77
C) 87
D) 97
ANSWER: C
A straight P-box has the property of __________.
A) invertible
B) non-invertible
C) both invertible and non-invertible
D) fixed-function
ANSWER: A
Which mode requires the implementation of only the encryption algorithm?
A) ECB
B) CBC
C) CTR
D) OFB
ANSWER: C
For p = 11 and q = 17 and choose e=7) Apply RSA algorithm where P=88 and thus find the ciphertext.
A) 23
B) 64
C) 11
D) 54
ANSWER: C
In public key cryptosystem, which keys are kept as public?
A) Encryption keys
B) Decryption keys
C) Encryption &Decryption keys
D) none of them
ANSWER: A
Challenge-response authentication can be done using ________.
A) symmetric-key ciphers
B) asymmetric-key ciphers
C) keyed-hash functions
D) all of them
ANSWER: D
In ________ authentication, the claimant proves that he knows a secret without actually sending it.
A) password-based
B) challenge-response
C) zero-knowledge
D) answer b and c
ANSWER: D
One of protocols to provide security at application layer is
A) Pretty Good Privacy.
B) Handshake Protocol.
C) Record Protocol.
D) Alert Protocol.
ANSWER: A
The __________ mechanism appends to the data a short check-value that has been created by a specific
process from the data itself.
A) data integrity
B) digital signature
C) routing control
D) access control
ANSWER: A
Additive ciphers are sometimes referred to as shift ciphers or _________.
A) stream ciphers
B) shift ciphers
C) monoalphabetic ciphers
D) Caesar ciphers
ANSWER: D
In monoalphabetic substitution, the relationship between a symbol in the plaintext and a symbol in
ciphertext is always _________.
A) one-to-one
B) one-to-many
C) many-to-one
D) many-to-many
ANSWER: A
In RC4 is a _________ stream cipher.
A) bit-oriented
B) byte-oriented
C) 8 byte-oriented
D) 8 bit-oriented
ANSWER: B
Confusion hides the relationship between the ciphertext and the _________.
A) plaintext
B) key
C) round
D) private key
ANSWER: B
In RSA, Ф(n) = _______ in terms of p and q.
A) (p)/(q)
B) (p)(q)
C) (p-1)(q-1)
D) (p+1)(q+1)
ANSWER: C
The secret key between members needs to be created as a _________ key when two members contact
KDC.
A) public
B) session
C) complimentary
D) private
ANSWER: B
Pretty good privacy (PGP) is used in __________.
A) browser security
B) email security
C) FTP security
D) wifi security
ANSWER: B
_________means to prove the identity of the entity that tries to access the system’s resources.
A) Message authentication
B) Entity authentication
C) Message confidentiality
D) Non-repudiation
ANSWER: B
IPsec in the transport mode does not protect the _________.
A) IP header
B) network layer payload
C) IP payload
D) IP trailer
ANSWER: A
Which classical cryptographic technique involves replacing each plaintext character with another
character?
A) Substitution
B) Transposition
C) Symmetric key cryptography
D) Asymmetric key cryptography
ANSWER: A

What is the primary goal of transposition in classical cryptography?


A) Replacing characters with others
B) Rearranging the order of characters
C) Encrypting data with multiple keys
D) Increasing the key size
ANSWER: B

Which classical cryptographic attack involves analyzing the frequency of characters to decrypt a
message?
A) Linear cryptanalysis
B) Differential cryptanalysis
C) Frequency analysis
D) Brute force attack
ANSWER: C
_________ is probably the most common aspect of information security.
A) Confidentiality
B) Integrity
C) Availability
D) None of the above
ANSWER: A

___________ means that the information created and stored by an organization needs to be available to
authorized enities.
A) Confidentiality
B) Integrity
C) Availability
D) None of the above
ANSWER: C

Two types fo attacks threaten the confidentiality of information are:


A) Modification and Masquerading
B) Replaying and Denial of service
C) Repudiation and Traffic analysis
D) Snooping and Traffic analysis
ANSWER: D
Attack in availability is
A) Modification
B) Denial of service
C) Traffic analysis
D) Snooping
ANSWER: B

There are ________ techniques that can be implement some or all of the mechanisms.
A) two
B) four
C) five
D) eight
ANSWER: A
The multiplicative inverse of 8 in modulus 100 is
A) 14
B) 45
C) 39
D) none of the above
ANSWER: D
The multiplicative inverse of 23 in modulus 100 is
A) 67
B) 77
C) 87
D) 97
ANSWER: C
A Feistel cipher can have self-invertible, invertible and non-invertible.
A) True
B) False
ANSWER: A
Confusion hides the relationship between ________ and ________.
A) the ciphertext and the key
B) the ciphertext and the plaintext
C) the plaintext and the key
D) the key and cipher
ANSWER: A
Which of the following is a type of transposition cipher?
A) Rail Fence cipher
B) Hill cipher
C) Rotor cipher
D) One time pad
ANSWER: A
Diffusion hides the relationship between_______ and _________.
A) the ciphertext and the key
B) the ciphertext and the plaintext
C) the plaintext and the key
D) the key and cipher
ANSWER: B
An straight P-box is __________.
A) invertible
B) non-invertible
C) both invertible and non-invertible
D) none of the above
ANSWER: A
Non-Feistel ciphers use ________ components.
A) only invertible
B) only non-invertible
C) both invertible and non-invertible
D) none of the above
ANSWER: A
Non-Feistel ciphers use ________ components.
A) only invertible
B) only non-invertible
C) invertible and non-invertible
D) none of the above
ANSWER: C
To be resistant to exhaustive-search attack, a modern block cipher needs to be designed as a
__________.
A) transposition cipher
B) substitution cipher
C) key_trnsposition cipher
D) none of the above
ANSWER: B

You might also like