131
87.3k

100+ Information and Network Security Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) .

51.

DES stands for ________________.

A. Device Encryption Standard
B. Data Encrypted Standard
C. Data Encryption Security
D. Data Encryption Standard
Answer» D. Data Encryption Standard
52.

____________ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.

A. Twofish
B. IDEA
C. DES
D. AES
Answer» D. AES
53.

AES stands for ________________.

A. Active Encryption Standard
B. Advanced Encrypted Standard
C. Advanced Encryption Standar
D. D Advanced Encryption Security
Answer» C. Advanced Encryption Standar
54.

AES is at least 6-times faster than 3-DES.

A. True
B. False
C. none
D. all
Answer» A. True
55.

_____________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.

A. Chorography
B. Tomography
C. Steganography
D. Cryptography
Answer» C. Steganography
56.

_____________ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files.

A. Steganography
B. Cryptography
C. Chorography
D. Tomography
Answer» A. Steganography
57.

Steganography follows the concept of security through obscurity.

A. True
B. False
C. none
D. all
Answer» A. True
58.

The word ________________is a combination of the Greek words ‘steganos’ which means “covered or concealed”, and ‘graphein’ which means “writing”.

A. Tomography
B. Chorography
C. Steganography
D. Cryptography
Answer» C. Steganography
59.

Which of the following is not a steganography tool?

A. Steghide
B. ReaperExploit
C. Image steganography
D. Xaio steganography
Answer» B. ReaperExploit
60.

Which of the following is not a steganography tool?

A. rSteg
B. Crypture
C. SteganographX Plus
D. Burp Suite
Answer» D. Burp Suite
61.

The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.

A. Program file
B. Special file
C. Ordinary file
D. Encrypted file
Answer» C. Ordinary file
62.

People will normally think it as a normal/regular file and your secret message will pass on without any _______________.

A. Cracking
B. Encryption
C. Suspicion
D. Decryption
Answer» C. Suspicion
63.

By using ______________ you can diminish the chance of data leakage.

A. Steganography
B. Chorography
C. Tomography
D. Cryptography
Answer» A. Steganography
64.

Which mode of operation has the worst “error propagation” among the following?

A. EC
B. B CB
C. C CBC
D. OFB
Answer» A. EC
65.

Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution?

A. EC
B. B CB
C. C CTR
D. OFB
Answer» C. C CTR
66.

Which mode requires the implementation of only the encryption algorithm?

A. OF
B. B CTR
C. CBC
D. ECB
Answer» B. B CTR
67.

Which of the following modes of operation does not involve feedback?

A. OF
B. B CTR
C. CBC
D. ECB
Answer» A. OF
68.

Which of the following is a natural candidates for stream ciphers?

A. OFB
B. ECB
C. CBC
D. CFB
Answer» A. OFB
69.

Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?

A. Rijndael
B. Serpent
C. Blowfish
D. JUPITER
Answer» D. JUPITER
70.

Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES algorithm?

A. Rijndael
B. RC6
C. Blowfish
D. MARS
Answer» D. MARS
71.

How many rounds does the AES-192 perform?

A. 16
B. 12
C. 14
D. 10
Answer» B. 12
72.

What is the expanded key size of AES-192?

A. 60 words
B. 32 words
C. 52 words
D. 44 words
Answer» C. 52 words
73.

The 4×4 byte matrices in the AES algorithm are called_______.

A. Permutations
B. Transitions
C. Words
D. States
Answer» D. States
74.

In AES the 4×4 bytes matrix key is transformed into a keys of size __________.

A. 60 words
B. 32 words
C. 52 words
D. 44 words
Answer» D. 44 words
75.

For the AES-128 algorithm there are __________ similar rounds and _________ round is different.

A. 9 ; the last
B. 8 ; the first and last
C. 10 ; no
D. 2 pair of 5 similar rounds ; every alternate
Answer» A. 9 ; the last
76.

There is an addition of round key before the start of the AES round algorithms.

A. True
B. False
C. none
D. all
Answer» A. True
77.

How many computation rounds does the simplified AES consists of?

A. 10
B. 8
C. 2
D. 5
Answer» C. 2
78.

On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?

A. Permutation P
B. Swapping of halves
C. XOR of subkey with function f
D. F function
Answer» B. Swapping of halves
79.

What is the block size in the Simplified AES algorithm?

A. 36 bits
B. 16 bits
C. 40 bits
D. 8 bits
Answer» C. 40 bits
80.

What is the key size in the S-AES algorithm?

A. 32 bits
B. 24 bits
C. 16 bits
D. None of the mentioned
Answer» C. 16 bits
81.

Which of the following is a faulty S-AES step function?

A. Mix Columns
B. Add round key
C. Byte substitution
D. Shift rows
Answer» C. Byte substitution
82.

How many step function do Round 1 and 2 each have in S-AES?

A. 1 and 4
B. 3 and 4
C. Both 4
D. 4 and 3
Answer» D. 4 and 3
83.

The inverse transformation matrix times the forward transformation matrix equals the identity matrix.

A. True
B. False
C. none
D. all
Answer» A. True
84.

How many round keys are generated in the AES algorithm?

A. 12
B. 11
C. 10
D. 8
Answer» B. 11
85.

DES follows_________.

A. SP Networks
B. Feistel Cipher Structure
C. Caesars Cipher
D. Hash Algorithm
Answer» B. Feistel Cipher Structure
86.

The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.

A. 16
B. 9
C. 12
D. 18
Answer» A. 16
87.

The DES algorithm has a key length of ______.

A. 16 Bits
B. 32 Bits
C. 64 Bits
D. 128 Bits
Answer» C. 64 Bits
88.

In the DES algorithm the round key is __________ bit and the Round Input is ____________bits.

A. 48, 32
B. 32, 32
C. 56, 24
D. 64,32
Answer» A. 48, 32
89.

In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________.

A. Addition of ones
B. Addition of zeros
C. Duplication of the existing bits
D. Scaling of the existing bits
Answer» D. Scaling of the existing bits
90.

The Initial Permutation table/matrix is of size _____.

A. 4×8
B. 8×8
C. 12×8
D. 16×8
Answer» B. 8×8
91.

The number of unique substitution boxes in DES after the 48 bit XOR operation are___.

A. 4
B. 8
C. 12
D. 16
Answer» B. 8
92.

What is the number of possible 3 x 3 affine cipher transformations?

A. 840
B. 168
C. 1344
D. 1024
Answer» C. 1344
93.

The S-Box is used to provide confusion, as it is dependent on the unknown key.

A. True
B. False
C. none
D. all
Answer» A. True
94.

For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.

A. 64
B. 11
C. 54
D. 23
Answer» B. 11
95.

For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Cipher message=11 and thus find the plain text.

A. 122
B. 143
C. 111
D. 88
Answer» D. 88
96.

In an RSA system the public key of a given user is e = 31, n = 3599. What is the private key of this user?

A. 1023
B. 2432
C. 2412
D. 3031
Answer» D. 3031
97.

Compute private key (d, p, q) given public key (e=23, n=233 ´ 241=56,153).

A. 32432
B. 19367
C. 12543
D. 35212
Answer» B. 19367
98.

RSA is also a stream cipher like Merkel-Hellman.

A. True
B. False
C. none
D. all
Answer» A. True
99.

In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?

A. p/q should give no remainder
B. p and q should be prime
C. p and q should be co-prime
D. p and q should be divisible by Ф(n)
Answer» B. p and q should be prime
100.

In RSA, Ф(n) = _______ in terms of p and q.

A. (p+1)(q+1)
B. (p-1)(q-1)
C. (p)(q)
D. (p)/(q)
Answer» B. (p-1)(q-1)

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.