0% found this document useful (0 votes)
15 views25 pages

All Unit MCQ 3

The document consists of multiple-choice questions related to cryptography and cyber security, covering topics such as encryption techniques, security protocols, and types of attacks. Each question is followed by the correct answer, providing a comprehensive overview of key concepts in the field. It serves as a study guide for individuals preparing for assessments in cryptography and cyber security.

Uploaded by

wafaa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views25 pages

All Unit MCQ 3

The document consists of multiple-choice questions related to cryptography and cyber security, covering topics such as encryption techniques, security protocols, and types of attacks. Each question is followed by the correct answer, providing a comprehensive overview of key concepts in the field. It serves as a study guide for individuals preparing for assessments in cryptography and cyber security.

Uploaded by

wafaa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

BFC 504- Cryptography and Cyber Security

MCQ Questions
1. Rail Fence Technique is an example of
a) Substitution b) Transposition c) Product cipher d) Caesar cipher

Answer : a

2. SET is
a) Electronic Payment System b) Security Protocol
c) Credit card payment d) Internet Payment System
Answer : a

3. Public key encryption is advantageous over Symmetric key Cryptography because of


a) Speed b) Space c) Key exchange d) Key length

Answer : c

4. The sub key length at each round of DES is__________


a) 32 b) 56 c) 48 d) 64

Answer : b

5. MAC is used to ensure


a) Authentication b) Confidentiality
c) Authentication and integrity d) Authentication and confidentiality

Answer : a

6. Total no. of messages used in SSL Handshake Protocol is


a) 12 b) 10 c) 8 d) 14

Answer : a

7. Which attack requires the least effort/computations?


a) Pre-image b) Second Pre-image
c) Collision d) All required the same effort

Answer : a

8. Differential Cryptanalysis can be mounted on


a) DES encryption algorithm b) AES encryption algorithm
c) RSA encryption algorithm d) Deffie-Hellman key exchange algorithm

Answer : a

9. Which one is the strong attack mechanism?


a) Chosen plaintext attack b) Chosen cipher text
c) Brute Force Attack d) Man in the middle attack

Answer : c

10. Message Digest length in SHA 1 is______ bits.


a) 128 b) 160 c) 64 d) 54
Answer : b

11. Interception is an attack on


a) Availability b) Confidentiality
c) Integrity d) Authenticity

Answer : b

12. ________ prevents either sender or receiver from denying a transmitted message.
a) Access Control b) Non repudiation
c) Masquerade d) Integrity

Answer : b

13. IDEA uses ____keys.


a) 3 b) 4 c) 5 d) 2

Answer : b

14. A Macro virus is


a) Platform dependent b) Platform independent
c) Idle d) Hidden

Answer : b

15. Which one of the following is active attack?


a) Masquerade b) Traffic analysis
c) Eavesdropping d) Shoulder surfing

Answer : a

16. Which of the following is passive attack?


a) Relay attack b) Masquerade
c) Traffic analysis d) Denial of Service

Answer : c

17. A firewall that uses two TCP connections is


a) Bastion b) Application gateway
c) Circuit level gateway d) Packet filtering

Answer : d

18. IPsec services are available in ______ Layer.


a) Application b) Data link c) Network d) Transport

Answer : c

19. IPsec services are available in ______ Layer.


a) Application b) Data link c) Network d) Transport

Answer : a
20. The Authentication Header (AH) , part of IPsec, provides which of the following security
function?
a) Source authentication b) Data Integrity
c) Data confidentiality d) Source authentication and data integrity

Answer : d

21. To verify a digital signature we need the


a) Sender’s Private key b) Sender’s Public key
c) Receiver’s Private key d) Receiver’s Public key

Answer : b

22. The secure socket layer provides


a) Encryption of messages sent by both client and server
b) Server authentication c) Optional client authentication d) All of these.

Answer : a

23. No. of keys used in Asymmetric key Cryptography is


a) 10 b) 02 c) 04 d) 01

Answer : b

24. Vigenere cipher is an example of


a) Polyalphabetic cipher b) Caesar cipher
c) Mono alphabetic cipher d) Product cipher

Answer : a

25. Firewall may be described as specified form of


a) Router b) Bridge c) Operating system d) Architecture

Answer : a

26. Tool for implementing security policy may be called as


a) Security process b) Security authentication
c) Security gaps d) Security mechanism

Answer : d

27. In MD-5 the length of the message digest is


a) 160 b) 128 c) 64 d) 54

Answer : b

28. RC4 is an example of


a) Hash algorithm b) Stream cipher
c) Block cipher d) None of these

Answer : c
29. For confidentiality, data to be sent is
a) Encrypted b) Decrypted c) Corrected d) Both (a) and (b)

Answer : a

30. A polymorphic virus undergoes


a) Crossover b) Mutation c) Genetic processing d) None of these.

Answer : b

31. Key used in the symmetric key cryptography is


a) Public key b) Private key c) Permanent key d) Session key

Answer : a

32. Chosen cipher text attack is based on


a) Cryptanalysis b) Cryptography c) Encryption d) Decryption

Answer : a

33. Authentication service that can be used in windows platform is


a) DES b) RSA c) MD5 d) KERBEROS

Answer : d

34. A virus that cannot be detected by antivirus software is


a) Parasitic b) Polymorphic c) Stealth d) Worm

Answer : c

35. An attack ok authenticity is


a) Interruption b) Interception c) Fabrication d) Violation

Answer : b

36. The process of writing the text as rows and read it as columns is known as
a) Vernam cipher b) Caesar cipher
c) Transposition columnar cipher d) Homophonic substitution cipher

Answer : c

37. The principal of _______ ensures that only the sender and the intended recipients have access to
the contents of message
a) Confidentiality b) Authentication c) Integrity d) Access control

Answer : b

38. In IDEA key is of ______ bits.


a) 128 b) 64 c) 256 d) 512

Answer : a

39. RSA_____ be used for digital signature.


a) Must no b) Cannot c) Can d) Should not

Answer : c

40. _______ is a message digest algorithm.


a) DES b) IDEA c) MD5 d) RSA

Answer : c

41. Biometric authentication works on the basis of


a) Human characteristics b) Passwords
c) Smart cards d) Pin

Answer : a

42. ______ forms the basis for the randomness of authentication token.
a) Password b) Seed c) MD5 d) RSA

Answer : a

43. In polyalphabetic cipher, the characters in plaintext have a relation with the characters in cipher
text
a) One to one b) One to many c) Many to one d) Many to many

Answer : b

44. In polyalphabetic cipher, the characters in plaintext have a relation with the characters in cipher
text
a) One to one b) One to many c) Many to one d) Many to many

Answer : b

45. There are ______ encryption rounds in IDEA.


a) 5 b) 16 c) 10 d) 8

Answer : d

46. The main goal of _____ attack is to obtain unauthorized access to the information.
a) Active b) Caesar c) Passive d) Brute force

Answer : c

47. _____ involves trying every possible key until a proper translation of cipher text into plain text
is obtained.
a) Man in the middle attack b) Chosen Plain text Attack
c) Brute Force attack d) None of these

Answer : c

48. Encryption Algorithm is


a) Mode of Cryptography b) Security approach of cryptography
c) Components of cryptography d) All of the above
Answer : c

49. _______ operates on smaller unit of plain text.


a) Block cipher b) Stream cipher
c) Rail fence d) Both (a) and (b)

Answer : b

50. In______ mode, the same plaintext value will always result in the same cipher text value.
a) Cipher Block Chaining b) Cipher Feedback
c) Electronic code book d) Output Feedback

Answer : c

51. Which cryptographic mode includes the use of Initial Vector?


a) Electronic Code book mode b) Cipher Block Chaining mode
c) Cipher Feedback mode d) Output Feedback mode

Answer : b

52. The DES process involves ____ number of rounds.


a) 8 b) 32 c) 12 d) 16

Answer : d

53. RC5 is a type of


a) Block Cipher b) Plain cipher
c) Stream Cipher d) Caesar cipher

Answer : a

54. In Digital Signature, there is _____ relationship between signature and message.
a) Many to one b) One to many
c) Many to many d) One to one

Answer : d

55. When a Hash function is used to provide message authentication, the hash function value is
referred to as
a) Message digest b) Message authentication code
c) Hashed based MAC d) None of these

Answer : a

56. In ______ , the malicious code is installed on a personal computer or server misdirecting users
to fraudulent website.
a) Phishing scam b) Pharming scam
c) Spoofing d) Sniffing

Answer : b

57. This web threat is used to fake one’s identity


a) Sniffing b) Spoofing c) Pharming d) Phishing
Answer : b

58. Which security protocol is used to secure pages where users are required to submit sensitive
information?
a) Secure Socket Layer b) Transport Layer Security
c) Secure IP d) Secure HTTP

Answer : a

59. The criteria which makes TLS more secure than SSL is
a) Message Authentication b) Key material generation
c) Both (a) and (b) d) None of these

Answer : c

60. The _____ mode of IPsec, take the whole IP packet to form secure communication between two
gateways
a) Transport b) Tunnel c) Either (a) or (b) d) Both (a) and (b)

Answer : b

61. The _____ authentication factor that relate to something that a user is or does and includes
biometric identifiers.
a) Knowledge factor b) Ownership factor
c) Inherence Factor d) Authentication factor

Answer : c

62. In password selection strategy, minimum length of characters used


a) 6 b) 10 c) 8 d) 14

Answer : b

63. Example of an Authentication Token is


a) Key fob b) Smart card c) Pin d) None of these

Answer : b

64. A ______ acts as a barrier between a trusted network and an untrusted network
a) Bridge b) Router c) Firewall d) Both (a) and (b)

Answer : c

65. It monitors the TCP handshaking going on between the local and remote host to determine
whether the session being initiated is legitimate.
a) Application Layer Firewall b) State full firewall
c) Packet firewall d) Circuit level firewall

Answer : d

66. A substitution cipher substitutes one symbol with


a) Keys b) Multi parties c) Single party d) Others
Answer : d

67. Man in the middle attack can endanger the security of Diffie Hellman method if two parties are
not
a) Joined b) Authenticated c) Submitted d) Shared

Answer : b

68. Which layer filters the proxy firewall?


a) Application b) Network c) Transport d) None of the above

Answer : a

69. Hash function is used to produce


a) Fingerprint of a file b) Useful for message authentication
c) Both (a) and (b) d) None of the above

Answer : b

70. Name the network attack that floods it with useless traffic.
a) Spoofing b) Denial of Service attack c) Virus d) Trojan Horse

Answer : a

71. Encryption Strength is based on


a) Strength of Algorithm b) Secrecy of key
c) Length of key d) All of the above

Answer : d

72. Kerberos is an authentication scheme that can be used for


a) Public key cryptography b) Digital signature
c) Hash function d) Single sign on

Answer : b

73. Which of the following is not a block cipher operating mode?


a) ECB b) CFB c) CBF d) CBC

Answer : c

74. One Time Pad is also known as


a) Playfair cipher b) Hill cipher c) Vigenere Cipher d) Perfect Secrecy

Answer : d

75. _________ is the name for Public Key Infrastructure certificate


a) Man in the Middle attack b) Certificate Authority
c) Resource Access Control facility d) Script kiddy

Answer : b
76. Network Address Translation is______ with transport mode.
a) Supported b) Not supported
c) May or may not supported d) Does not have any relation

Answer : b

77. Which one of the following belongs to SSL protocol?


a) Handshake Protocol b) Change Cipher Spec protocol
c) Both (a) and (b) d) None of the above

Answer : c

78. Encapsulating Security Payload (ESP) belongs to which Internet Security Protocol?
a) Secure Socket Layer Protocol b) Secure IP Protocol
c) Secure Http Protocol d) Transport Layer Security Protocol

Answer : b

79. The four Primary Security Principles related to messages are


a) Confidentiality, Integrity, Non repudiation and Authentication.
b) Confidentiality, Access Control, Integrity, Non repudiation.
c) Authentication, Authorization, Availability, Integrity
d) Availability, Authorization, Confidentiality, Integrity.

Answer : a

80. ________ is the science to make them secure


a. Cryptography b. Cryptoanalysis
c. either (a) or (b) d. neither (a) nor (b)

Answer : a

81. The ________is the original


a. ciphertext b. plaintext c. secret-text d. none of the above

Answer : b

82. The ________ is the


a. ciphertext b. plaintext c. secret-text d. none of the above

Answer : a

83. A(n) _______ algorithm


a. encryption b. decryption c. either (a) or (b) d. neither (a) nor (b)

Answer : a

84. A(n) _______ algorithm


a. encryption b. decryption c. either (a) or (b) d. neither (a) nor (b)

Answer : b

85. A combination of an algorithm is called a ________.


a. cipher b. secret c. key d. none of the above

Answer : a

86. The _______ is a number operates


a. cipher b. secret c. key d. none of the above

Answer : c

87. In a(n) ________ cipher, and receiver.


a. symmetric-key b. asymmetric-key
c. either (a) or (b) d. neither (a) nor (b)

Answer : a

88. In a(n) ________, the


a. symmetric-key b. asymmetric-key
c. either (a) or (b) d. neither (a) nor (b)

Answer : a

89. In a(n) ________ cipher, a pair of keys is used.


a. symmetric-key b. asymmetric-key
c. either (a) or (b) d. neither (a) nor (b)

Answer : b

90. In an asymmetric key cipher, the sender uses the _______________ key
a) private b) public c) either (a) or (b) d) neither (a) nor (b)

Answer : b

91. In an asymmetric-key
a. private b. public c. either (a) or (b) d. neither (a) nor (b)

Answer : a

92. A ________ cipher replaces character.


a. substitution b. transposition c. either (a) or (b) d. neither (a) nor (b)

Answer : a

93. DES is a(n)_________________method adopted by the U.U government


a) symmetric key b) asymmetric key c) either (a) or (b) d) neither (a) nor (b)

Answer : a

94. DES has an initial and final permutation block and _________________
a) 14 b) 15 c) 16 d) none of the above

Answer : c

95. DES uses a key generator to generate sixteen_____________round keys


a) 32-bit b) 48-bit c) 54-bit d) 42-bit

Answer : b

96. The Caesar cipher is a ____________ cipher that has a key of 3


a) transposition b) additive c) shift d) none of the above

Answer : c

97. The __________ cipher reorders the plaintext characters to create a cipher text
a) substitution b) transposition c) either (a) or (b) d) neither (a) or (b)

Answer : b

98. A (n) __________ is a keyless substitution cipher with N inputs and M outputs that uses a
formula to define the relationship between the input stream and the output stream.
a) S-box b) P-box c) T-box d) None of the above

Answer : a

99. A(n) _____________ is a keyless transposition cipher with N inputs and M outputs that uses a
table to define the relationship between the input stream and the output stream.
a) S-box b) P-box c) T-box d) None of the above

Answer : b

100. A modern cipher is usually a complex ___________ cipher made of a combination of different
simple ciphers.
a) round b) circle c) square d) none of the above

Answer : a

101. Number of phases in the handshaking protocol?


a) 2 b) 3 c) 4 d) 5
Answer : c

102. In the SSL record protocol operation pad_2 is –


a) is the byte 0x36 repeated 40 times for MD5
b) is the byte 0x5C repeated 48 times for MD5
c) is the byte 0x5C repeated 48 times for SHA-1
d) is the byte 0x36 repeated 48 times for MD5
Answer : b

103.In the SSL record protocol operation pad_1 is –


a) is the byte 0x36 repeated 40 times for MD5
b) is the byte 0x5C repeated 40 times for MD5
c) is the byte 0x5C repeated 48 times for SHA-1
d) is the byte 0x36 repeated 48 times for MD5
Answer : d
104. In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication
and Key Exchange?
a) server_done b) server_key_exchange
c) certificate_request d) crtificate_verify
Answer : a

105. Which is the key exchange algorithm used in CipherSuite parameter?


a) RSA b) Fixed Diffie-Hellman
c) Ephemeral Diffie-Hellman d) Any of the mentioned
Answer : d

106.The certificate message is required for any agreed-on key exchange method except
_______________
a) Ephemeral Diffie-Hellman b) Anonymous Diffie-Hellman
c) Fixed Diffie-Hellman d) RSA
Answer : b

107. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed
for which of the following cipher systems?
a) Fortezza b) Anonymous Diffie-Hellman
c) Fixed Diffie-Hellman d) RSA
Answer : c

108. The DSS signature uses which hash algorithm?


a) MD5 b) SHA-2 c) SHA-1 d) Does not use hash algorithm

Answer : c

109. The RSA signature uses which hash algorithm?


a) MD5 b) SHA-1 c) digital signature d) None of the mentioned.
Answer : b

110. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
a) 42 bytes b) 32 bytes c) 36 bytes d) 48 bytes
Answer : c

111. The certificate_request massage includes two parameters, one of which is-
a) certificate_extension b) certificate_creation
c) certificate_exchange d) certificate_type
Answer : d
112. The client_key_exchange message uses a pre master key of size –
a) 48 bytes b) 56 bytes c) 64 bytes d) 32 bytes
Answer : a

113. The certificate_verify message involves the process defined by the pseudo-code (in terms of
MD5) –
CertificateVerify.signature.md5_hash = MD5(master_secret || pad_2 || MD5(handshake_messages ||
master_secret || pad_1). Is there any error? If so, what is it?
a) Yes. pad_1 and pad_2 should be interchanged
b) Yes. pad’s should be present towards the end
c) Yes. master_key should not be used, the pre_master key should be used
d) No Error
Answer : d

114. In the handshake protocol which is the message type first sent between client and server ?
a) server_hello b) client_hello
c) hello_request d) certificate_request
Answer : b

115. n the SSLv3 the padding bits are ____________ with the secret key.
a) Padded b) XORed c) Concatenated d) ANDed
Answer : c

116. Which of the following is not a valid input to the PRF in SSLv3?
a) secret value b) identifying label
c) initialization vector d) secret value
Answer : c

117. Which of the following alert codes is not supported by SSLv3?


a) record_overflow b) no_certificate
c) internal_error d) decode_error
Answer : b

118. We encounter the record_overflow error when the payload length exceeds –
a) 214 + 1024 b) 216 + 1024
c) 214 + 2048 d) 216 + 2048
Answer : c

119. Which key exchange technique is not supported by SSLv3?


a) Anonymous Diffie-Hellman b) Fixed Diffie-Hellman
c) RSA d) Fortezza
Answer : d

120. Calculation of the certificate_verify in TLS involves the use of a finished_label. The
finished_label is the string-
a) client finished for the client
b) client finished for the client, server finished for the server
c) server finished for the server
d) client finished for the server, server finished for the client
Answer : b

121. In TLS padding cann be upto a maximum of –


a) 79 bytes b) 127 bytes c) 255 bytes d) none of the mentioned
Answer : c

122. URL stands for –


a) Universal Remote Locator b) Universal Resource Language
c) Uniform Resource Locator d) Uniform Resource Language
Answer : c

123. An HTTP connection uses port _________ whereas HTTPS uses port ____________ and
invokes SSL.
a) 40; 80 b) 60; 620 c) 80; 443 d) 620; 80
Answer : c

124. Which of the following is not a secure shell protocol?


a) Transport Layer Protocol b) Secure Layer Protocol
c) Connection Protocol d) User Authentication Protocol
Answer : b

125. Which is the lowest level in the SSH protocol stack?


a) SSH Transport Layer Protocol b) TCP
c) IP d) SSH User Authentication Protocol
Answer : c

126. How many trust models does the RFC 4251 dictate?
a) 2 b) 3 c) 4 d) 5
Answer : a

127. Which is the correct order of the SSH Transport Layer Protocol Packet Exchanges?
a) Algorithm Negotiation; End of key exchange; Service request; Identification string exchange
b) Identification string exchange; Algorithm Negotiation; End of key exchange; Service request
c) Identification string exchange; End of key exchange; Service request; Algorithm Negotiation
d) Algorithm Negotiation; Identification string exchange; End of key exchange; Service request
Answer : b

128. The correct order of operations in the SSH Transport Layer Protocol Packet Formation is –
a) Compression; Encryption; Padding and Addition of seq bits
b) Compression; Padding and Addition of seq bits; Encryption
c) Encryption; Padding and Addition of seq bits; Compression
d) Padding and Addition of seq bits; Encryption; Compression
Answer : b

129. Size of the sequence number is-


a) 32 bits b) 48 bits c) 56 bits d) 64 bits
Answer : a

130. Which one of the following does not undergo the encryption procedure?
a) pdl b) pktl c) seq# d) padding
Answer : c

131. What is the recommended cryptographic algorithm for the Secure Shell Transport Layer?
a) twofish 128 b) aes 192 c) aes 128 d) blowfish
Answer : c

132. What is the recommended modes of operation for encryption and decryption in the Secure
Shell Transport Layer?
a) ECB b) OFB c) CBC d) CFB
Answer : c

133. What is the recommended MAC algorithm for the SSH Transport Layer?
a) HMAC – MD5 b) HMAC – MD5 – 96
c) HMAC SHA1 – 96 d) HMAC SHA1

Answer : c

134. Which port forwarding technique intercepts application-level traffic and redirects it from an
insecure TCP connections to secure SSH tunnels?
a) Remote Forwarding b) Local Forwarding
c) Stable Forwarding d) None of the mentioned
Answer : b
135. The protocol ‘POP’ stands for-
a) Personal Office Protocol b) Post Office Protocol
c) Privacy Overall Protocol d) Privacy Over Protocol
Answer : b

136.In which port forwarding technique does the client act on the server’s behalf?
a. Remote Forwarding b. Local Forwarding
c. Stable Forwarding d. None of the mentioned
Answer : a

137. Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash
computation.
a. 1024 b. 512 c. 256 d.1248
Answer : a

138. When a hash function is used to provide message authentication, the hash function value is
called to as:
a. Message Field b. Message Digest
c. Message Score d. Message Leap
Answer : b

139. Which of the following are used to create a message digest by the network security protocols?
a. RSA b. SHA-1 c. DES d. MD5
Answer : b

140. What is the output of the N 1024-bit blocks from the Nth stage in this?
a. 512 bits b. 1024 bits c. N x 1024bits d. N x 512 bits
Answer : a

141. What is the output of a cryptographic hash function means?


a. A variable set of bits
b. A fixed set of bits, derived from one-way mathematical operations
c. An output which may be easily discovered by an adversary
d. Outputs of such functions are of no importance
Answer : b

142. A hash function is a _____ that converts a numerical input value into another compressed
numerical value.
a. Abstract view b. Mathematical function
c. Both A and B d. None of the mentioned above
Answer : b

143. _____ and encryption is two separate cryptographic processes.


a. Hashing b. Decryption
c. Processing d. None of the mentioned above
Answer : a

144. Amongst which of the following is /are good for Hashes,


a. Password protection b. Data integrity / file verification
c. Digital signatures and virus signatures d. All of the mentioned above
Answer : d

145. Digital Signatures authenticates the sender by appending the original message with the ____
digest.
a. Decrypted message b. Encrypted message
c. Systematic approach d. None of the mentioned above
Answer : b

146. What is the block size of plain text in SHA- 512 algorithm?
a. 512 bits b. 1024 bits c. 2048 bits d. None of the above
Answer : b

147. How many sub-keys in the total are used by the IDEA for encrypting the plain text into
ciphertext?
a. 64 sub- keys b. 48 sub- keys
c. 52 sub- keys d. Only one key and no subkeys
Answer : c

148. "The number of rounds in the AES algorithm depends upon the key size being used."
Which among the following shows a correct relation between the size of the key used and the
number of rounds performed in the AES algorithm?
a. 128 key size: 10 rounds b. 192 key size: 12 rounds
c. 256 key size: 14 rounds d. All of the above
Answer : d
149. Which of the following properties are the characteristic properties of a block cipher technique
which differs from stream cipher?
a. Avalanche effect b. Completeness
c. Both a. and b. d. None of the above
Answer : c

150. Encryption algorithms are divided into two categories based on the ______.
a. Output type b. Input type
c. Process type d. All of the mentioned above
Answer : b

151. Cipher block chaining or CBC is an advancement made on _____.


a. Electronic Code Book b. Decrypted code
c. System engineering d. All of the mentioned above
Answer : a

152. Cipher Feedback Mode is given as feedback to the ____ of encryption with some new
specifications.
a. Next block b. Previous block
c.Middle block d. All of the mentioned above
Answer : a

153. In the AES-128 algorithm there are mainly __________ similar rounds and _________ round
is different from other round.
a. 5 similar rounds having 2 pair ; every alternate b. 9 ; the last
c. 8 ; the first and last d. 10 ; no
Answer : b

154. Which of the following modes of operation in DES is used for operating?
a. Cipher Feedback Mode (CFB) b. Cipher Block chaining (CBC)
c. Electronic code book (ECB) d. Output Feedback Modes (OFB)
Answer : c

155. Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find
ciphertext. The Ciphertext is:
a. 42 b. 93 c. 114 d. 103
Answer : c

156. Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.
a. 16 bits b. 64 bits c. 32 bits d. All of the mentioned above
Answer : b

157. The process of decryption of an AES ciphertext is similar to the encryption process in the
______.
a. Reverse order b. Next order
c. Both A and B d. All of the mentioned above
Answer : a

158. RSA algorithm is ____ cryptography algorithm.


a. Systematic b. Symmetric
c. Asymmetric d. None of the mentioned above
Answer : c

159. Amongst which of the following is / are true with reference to the rounds in AES –
a. Byte Substitution b. Shift Row
c. Mix Column and Key Addition d. All of the mentioned above
Answer : d

160. Which of the following is a mode of operation for the Block ciphers in cryptography?
a. Electronic Code Book (ECB) b. Cipher Block Chaining (CBC)
c. Counter (CTR) mode d. All of the above
Answer : d

161. For which of the following should EBC (Electronic Code Book) process not be used for
encryption?
a. For large block sizes b. For fixed block sizes
c. For small block sizes d. None of the above
Answer : c

162. Which of the following options is not correct according to the definition of the Cipher Block
Chaining (CBC)?
a. CBC is a mode of operation for stream ciphers.
b. Initialization vector (IV) is used in CBC in the initial phase.
c. It has better resistive nature towards cryptanalysis than ECB
d. None of the above
Answer : c

163. Which of the following modes of operations can be followed for both stream ciphers as well as
block ciphers?
a. CBC (Cipher Block Chaining) b. ECB (Electronic Code Book)
c. CFB (Cipher text Feed Back) d. All of the above
Answer : c

164. Amongst which of the following is/ are showing the goodness of electronic code book,
a. Parallel encryption of blocks of bits is possible b. It is a faster way of encryption.
c. Simple way of the block cipher. d. All of the mentioned above
Answer : d

165. In Cipher block chaining mode, the current plaintext block is added to the ____.
a. Previous ciphertext block b. Next ciphertext block
c. Middle ciphertext block d. None of the mentioned above
Answer : a

166. With reference to Cipher Feedback (CFB) Mode, amongst which of the following is /are true,
a. Each ciphertext block gets 'fed back' into the encryption process
b. Encrypt the next plaintext block
c. Both A and B
d. None of the mentioned above
Answer : c

167. An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several
modes to _____.
a. Randomize the decryption b. Randomize the encryption
c. Minimize and maximize the randomization d. None of the mentioned above
Answer : b

168. TCP/IP is composed of _______ number of layers.


a. 2 b. 3. c. 4 d. 5
Answer : c

169. Trusted TCP/IP commands have the same needs & go through the identical verification
process. Which of them is not a TCP/IP command?
a. ftp b. rexec c. tcpexec d. telnet
Answer : c

170. Connection authentication is offered for ensuring that the remote host has the likely Internet
Protocol (IP) ___________ & _________
a. address, name b. address, location
c. network, name d. network, location
Answer : a

171. RoBOT is abbreviated as ___________


a. Return of Bleichenbacher’s Oracle Team b. Rise of Bleichenbacher’s Oracle Threat
c. Return of Bleichenbacher’s Operational Threat d. Return of Bleichenbacher’s Oracle Threat
Answer : d

172. There are __________ different versions of IP popularly used.


a. 2 b. 3 c. 4 d. 5
Answer : a

173. ____________ is an attack where the attacker is able to guess together with the sequence
number of an in progress communication session & the port number.
a. TCP Spoofing b. TCP Blind Spoofing
c. IP Spoofing d. IP Blind Spoofing
Answer : b

174. ___________ is an attack technique where numerous SYN packets are spoofed with a bogus
source address which is then sent to an inundated server.
a. SYN flooding attack b .ACK flooding attack.
c. SYN & ACK flooding attack d. Packet flooding attack
175. Which of them is not an attack done in the network layer of the TCP/IP model?
a. MITM attack b. DoS attack
c. Spoofing attack d. Shoulder surfing
Answer : d

176. Which of them is not an appropriate method of router security?


a. Unused ports should be blocked
b. Unused interfaces and services should be disabled
c. Routing protocol needs to be programmed by security experts
d. Packet filtering needs to be enabled
Answer : c

177. Which 2 protocols are used in the Transport layer of the TCP/IP model?
a. UDP and HTTP b. TCP and UDP
c. HTTP and TCP d. ICMP and HTTP
Answer : b

178. Which of the protocol is not used in the network layer of the TCP/IP model?
a. ICMP b. IP c. IGMP d. HTTP
Answer : d

179. ___________ protocol attack is done in the data-link layer.


a. HTTP b. DNS c. TCP/IP d. POP
Answer : b

180. What is the output of a cryptographic hash function means?


a. A variable set of bits
b. A fixed set of bits, derived from one-way mathematical operations
c. An output which may be easily discovered by an adversary
d. Outputs of such functions are of no importance
Answer : b

181. We are provided the plain text “SUN”. You need to convert the given plain text into ciphertext
under the Ceasar cipher encryption technique. Which of the following options is the correct
ciphertext for the given text if the key is 2?
a. UWP b. NUS c. WUP d. QSL
Answer : a

182. Which of the following cannot be chosen as a key in the Caesar cipher?
a. An integer b. An alphabet (A-Z or a-z)
c. A string d. None of the above
Answer : c

183. Block ciphers accumulate symbols in a message of a ______.


a. Fixed size b. Variable
c. Integration d. All of the mentioned above
Answer : a
184. With symmetric key algorithms, the ____ key is used for the encryption and decryption of
data.
a. Different b. Same
c. Both A and B d. None of the mentioned above
Answer : b

185. ____ is the message or data that can be readable by the sender.
a. Edited b. Main Text
c. Plain text d. All of the mentioned above
Answer : c

186. In the case of symmetric key encryption, the secret key that both the parties possess can be
anything such as a _______.
a. Passcode or a password b. Developed code
c. Network set d. None of the mentioned above
Answer : a

187. The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the
following properties are not shown by the fiestal structure?
a. The input text is divided into two parts: one being left half and another one being right half.
b. Swapping of the left and right halves are performed after each round.
c. The plain text is converted into a matrix form first
d. None of the above
Answer : c

188. Among the following given options, chose the strongest encryption technique?
a. DES ( Data Encryption Standard) b. Double DES
c. Triple DES d. AES (Advance Encryption Standard)
Answer : d

189. What is the full-form of RSA in the RSA encryption technique?


a. Round Security Algorithm b. Rivest, Shamir, Adleman
c. Robert, Shamir, Addie d. None of the above
Answer : b

190. Codes and ciphers are different ways to _____ a message.


a. Encrypt b. Decrypt
c. Both A and B d. All of the mentioned above
Answer : c

191. _____ ciphers encrypt uniformly sized blocks of data.


a. Set b. Block c. Rack d. All of the mentioned above
Answer : b

192. Decryption is a process to unveil the ______.


a. Unsecured data b. Secured data
c. Insecure d. None of the mentioned above
Answer : b

193. Which of the following is not a principle of data security?


a. Data Confidentiality b. Data Integrity
c. Authentication d. None of the above
Answer : d

194. "A key is a string of bits used by a cryptographic algorithm to transform plain text into
ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?
a. An integer values b. A square matrix
c. An array of characters (i.e. a string) d. All of the above
Answer : d

195. A mechanism used to encrypt and decrypt data.


a. Cryptography b. Algorithm
c. Data flow d. None of these
Answer : a

196. To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
a. Word, number, or phrase b. Special Symbols
c. Function Keys d. All of these
Answer : a

197. Conventional cryptography also known as ... encryption.


a. asymmetric-key b. logical-key
c. symmetric-key d. None of these
Answer : c

198. The Data Encryption Standard (DES) is an example of a ...


a. Conventional cryptosystem b. Asymmetric cryptosystem
c. Caesar's cryptosystem d. All of these
Answer : a

199. Public key cryptography is a ... cryptosystem


a. Symmetric b. Asymmetric
c. Symmetric & Asymmetric both d. None of these
Answer : b

200. Cipher in cryptography is –


a. Encrypted message
b. Algorithm for performing encryption and decryption
c. Both algorithm for performing encryption and decryption and encrypted message
d. Decrypted message

Answer : c

You might also like