

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) .
51. |
DES stands for ________________. |
A. | Device Encryption Standard |
B. | Data Encrypted Standard |
C. | Data Encryption Security |
D. | Data Encryption Standard |
Answer» D. Data Encryption Standard |
52. |
____________ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES. |
A. | Twofish |
B. | IDEA |
C. | DES |
D. | AES |
Answer» D. AES |
53. |
AES stands for ________________. |
A. | Active Encryption Standard |
B. | Advanced Encrypted Standard |
C. | Advanced Encryption Standar |
D. | D Advanced Encryption Security |
Answer» C. Advanced Encryption Standar |
54. |
AES is at least 6-times faster than 3-DES. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
55. |
_____________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data. |
A. | Chorography |
B. | Tomography |
C. | Steganography |
D. | Cryptography |
Answer» C. Steganography |
56. |
_____________ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files. |
A. | Steganography |
B. | Cryptography |
C. | Chorography |
D. | Tomography |
Answer» A. Steganography |
57. |
Steganography follows the concept of security through obscurity. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
58. |
The word ________________is a combination of the Greek words ‘steganos’ which means “covered or concealed”, and ‘graphein’ which means “writing”. |
A. | Tomography |
B. | Chorography |
C. | Steganography |
D. | Cryptography |
Answer» C. Steganography |
59. |
Which of the following is not a steganography tool? |
A. | Steghide |
B. | ReaperExploit |
C. | Image steganography |
D. | Xaio steganography |
Answer» B. ReaperExploit |
60. |
Which of the following is not a steganography tool? |
A. | rSteg |
B. | Crypture |
C. | SteganographX Plus |
D. | Burp Suite |
Answer» D. Burp Suite |
61. |
The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________. |
A. | Program file |
B. | Special file |
C. | Ordinary file |
D. | Encrypted file |
Answer» C. Ordinary file |
62. |
People will normally think it as a normal/regular file and your secret message will pass on without any _______________. |
A. | Cracking |
B. | Encryption |
C. | Suspicion |
D. | Decryption |
Answer» C. Suspicion |
63. |
By using ______________ you can diminish the chance of data leakage. |
A. | Steganography |
B. | Chorography |
C. | Tomography |
D. | Cryptography |
Answer» A. Steganography |
64. |
Which mode of operation has the worst “error propagation” among the following? |
A. | EC |
B. | B CB |
C. | C CBC |
D. | OFB |
Answer» A. EC |
65. |
Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution? |
A. | EC |
B. | B CB |
C. | C CTR |
D. | OFB |
Answer» C. C CTR |
66. |
Which mode requires the implementation of only the encryption algorithm? |
A. | OF |
B. | B CTR |
C. | CBC |
D. | ECB |
Answer» B. B CTR |
67. |
Which of the following modes of operation does not involve feedback? |
A. | OF |
B. | B CTR |
C. | CBC |
D. | ECB |
Answer» A. OF |
68. |
Which of the following is a natural candidates for stream ciphers? |
A. | OFB |
B. | ECB |
C. | CBC |
D. | CFB |
Answer» A. OFB |
69. |
Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent? |
A. | Rijndael |
B. | Serpent |
C. | Blowfish |
D. | JUPITER |
Answer» D. JUPITER |
70. |
Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES algorithm? |
A. | Rijndael |
B. | RC6 |
C. | Blowfish |
D. | MARS |
Answer» D. MARS |
71. |
How many rounds does the AES-192 perform? |
A. | 16 |
B. | 12 |
C. | 14 |
D. | 10 |
Answer» B. 12 |
72. |
What is the expanded key size of AES-192? |
A. | 60 words |
B. | 32 words |
C. | 52 words |
D. | 44 words |
Answer» C. 52 words |
73. |
The 4×4 byte matrices in the AES algorithm are called_______. |
A. | Permutations |
B. | Transitions |
C. | Words |
D. | States |
Answer» D. States |
74. |
In AES the 4×4 bytes matrix key is transformed into a keys of size __________. |
A. | 60 words |
B. | 32 words |
C. | 52 words |
D. | 44 words |
Answer» D. 44 words |
75. |
For the AES-128 algorithm there are __________ similar rounds and _________ round is different. |
A. | 9 ; the last |
B. | 8 ; the first and last |
C. | 10 ; no |
D. | 2 pair of 5 similar rounds ; every alternate |
Answer» A. 9 ; the last |
76. |
There is an addition of round key before the start of the AES round algorithms. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
77. |
How many computation rounds does the simplified AES consists of? |
A. | 10 |
B. | 8 |
C. | 2 |
D. | 5 |
Answer» C. 2 |
78. |
On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function? |
A. | Permutation P |
B. | Swapping of halves |
C. | XOR of subkey with function f |
D. | F function |
Answer» B. Swapping of halves |
79. |
What is the block size in the Simplified AES algorithm? |
A. | 36 bits |
B. | 16 bits |
C. | 40 bits |
D. | 8 bits |
Answer» C. 40 bits |
80. |
What is the key size in the S-AES algorithm? |
A. | 32 bits |
B. | 24 bits |
C. | 16 bits |
D. | None of the mentioned |
Answer» C. 16 bits |
81. |
Which of the following is a faulty S-AES step function? |
A. | Mix Columns |
B. | Add round key |
C. | Byte substitution |
D. | Shift rows |
Answer» C. Byte substitution |
82. |
How many step function do Round 1 and 2 each have in S-AES? |
A. | 1 and 4 |
B. | 3 and 4 |
C. | Both 4 |
D. | 4 and 3 |
Answer» D. 4 and 3 |
83. |
The inverse transformation matrix times the forward transformation matrix equals the identity matrix. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
84. |
How many round keys are generated in the AES algorithm? |
A. | 12 |
B. | 11 |
C. | 10 |
D. | 8 |
Answer» B. 11 |
85. |
DES follows_________. |
A. | SP Networks |
B. | Feistel Cipher Structure |
C. | Caesars Cipher |
D. | Hash Algorithm |
Answer» B. Feistel Cipher Structure |
86. |
The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key. |
A. | 16 |
B. | 9 |
C. | 12 |
D. | 18 |
Answer» A. 16 |
87. |
The DES algorithm has a key length of ______. |
A. | 16 Bits |
B. | 32 Bits |
C. | 64 Bits |
D. | 128 Bits |
Answer» C. 64 Bits |
88. |
In the DES algorithm the round key is __________ bit and the Round Input is ____________bits. |
A. | 48, 32 |
B. | 32, 32 |
C. | 56, 24 |
D. | 64,32 |
Answer» A. 48, 32 |
89. |
In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________. |
A. | Addition of ones |
B. | Addition of zeros |
C. | Duplication of the existing bits |
D. | Scaling of the existing bits |
Answer» D. Scaling of the existing bits |
90. |
The Initial Permutation table/matrix is of size _____. |
A. | 4×8 |
B. | 8×8 |
C. | 12×8 |
D. | 16×8 |
Answer» B. 8×8 |
91. |
The number of unique substitution boxes in DES after the 48 bit XOR operation are___. |
A. | 4 |
B. | 8 |
C. | 12 |
D. | 16 |
Answer» B. 8 |
92. |
What is the number of possible 3 x 3 affine cipher transformations? |
A. | 840 |
B. | 168 |
C. | 1344 |
D. | 1024 |
Answer» C. 1344 |
93. |
The S-Box is used to provide confusion, as it is dependent on the unknown key. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
94. |
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT. |
A. | 64 |
B. | 11 |
C. | 54 |
D. | 23 |
Answer» B. 11 |
95. |
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Cipher message=11 and thus find the plain text. |
A. | 122 |
B. | 143 |
C. | 111 |
D. | 88 |
Answer» D. 88 |
96. |
In an RSA system the public key of a given user is e = 31, n = 3599. What is the private key of this user? |
A. | 1023 |
B. | 2432 |
C. | 2412 |
D. | 3031 |
Answer» D. 3031 |
97. |
Compute private key (d, p, q) given public key (e=23, n=233 ´ 241=56,153). |
A. | 32432 |
B. | 19367 |
C. | 12543 |
D. | 35212 |
Answer» B. 19367 |
98. |
RSA is also a stream cipher like Merkel-Hellman. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
99. |
In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’? |
A. | p/q should give no remainder |
B. | p and q should be prime |
C. | p and q should be co-prime |
D. | p and q should be divisible by Ф(n) |
Answer» B. p and q should be prime |
100. |
In RSA, Ф(n) = _______ in terms of p and q. |
A. | (p+1)(q+1) |
B. | (p-1)(q-1) |
C. | (p)(q) |
D. | (p)/(q) |
Answer» B. (p-1)(q-1) |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.