59
75k

160+ Cryptography and Network Security (CNS) Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Uncategorized topics .

1.

In symmetric-key cryptography, the key locks and unlocks the box is

A. same
B. shared
C. private
D. public
Answer» A. same
2.

The keys used in cryptography are

A. secret key
B. private key
C. public key
D. all of them
Answer» D. all of them
3.

Cryptography, a word with Greek origins, means

A. corrupting data
B. secret writing
C. open writing
D. closed writing
Answer» B. secret writing
4.

A transposition cipher reorders (permutes) symbols in a

A. block of packets
B. block of slots
C. block of signals
D. block of symbols
Answer» D. block of symbols
5.

Network Security provides authentication and access control for resources.

A. true
B. false
Answer» A. true
6.

Which is not an objective of network security?

A. identification
B. authentication
C. access control
D. lock
Answer» D. lock
7.

The process of verifying the identity of a user.

A. authentication
B. identification
C. validation
D. verification
Answer» A. authentication
8.

Which of these is a part of network identification?

A. user id
B. password
C. otp
D. fingerprint
Answer» A. user id
9.

The process of transforming plain text into unreadable text.

A. decryption
B. encryption
C. network security
D. information hiding
Answer» B. encryption
10.

An algorithm used in encryption is referred to as cipher.

A. true
B. false
Answer» A. true
11.

A process of making the encrypted text readable again.

A. decryption
B. encryption
C. network security
D. information hiding
Answer» A. decryption
12.

A person who enjoys learning details about computers and how to enhance their capabilities.

A. cracker
B. hacker
C. app controller
D. site controller
Answer» B. hacker
13.

A small program that changes the way a computer operates.

A. worm
B. trojan
C. bomb
D. virus
Answer» D. virus
14.

An asymmetric-key (or public-key) cipher uses

A. 1 key
B. 2 key
C. 3 key
D. 4 key
Answer» B. 2 key
15.

We use cryptofraphy term to transform messages to make them secure and immune to

A. change
B. idle
C. attacks
D. defend
Answer» C. attacks
16.

In cryptography , the original message before being transformmed , is called

A. simple text
B. plain text
C. empty text
D. filled text
Answer» B. plain text
17.

A straight permutation cipher or a straight p-box has the same number of input as

A. cipher
B. frames
C. outputs
D. bits
Answer» C. outputs
18.

The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not

A. authenticated
B. joined
C. submit
D. separate
Answer» A. authenticated
19.

Which of the following is not a transport layer vulnerability?

A. mishandling of undefined , poorly defined
B. the vulnerability that allows fingerprinting & other enumeration of host information
C. overloading of transporting layer mechanisms
D. unauthorized network access
Answer» D. unauthorized network access
20.

Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets.

A. true
B. false
Answer» A. true
21.

TCP/IP model does not have                layer but OSI model have this layer.

A. session layer
B. transport layer
C. application layer
D. network layer
Answer» A. session layer
22.

In cryptography, what is cipher?

A. algorithm for performing encrption and decryption
B. encrypted message
C. both algorith for performing encrption and decryption and encrypted message
D. decrypted message
Answer» A. algorithm for performing encrption and decryption
23.

In cryptography, the order of the letters in a message is rearranged by

A. transpositional ciphers
B. substitution ciphers
C. both
D. quadratic ciphers
Answer» A. transpositional ciphers
24.

What is data encryption standard (DES)?

A. block cipher
B. stream cipher
C. bit cipher
D. byte cipher
Answer» A. block cipher
25.

Cryptanalysis is used                         

A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. to make new ciphers
Answer» A. to find some insecurity in a cryptographic scheme
26.

Choose from among the following cipher systems, from best to the worst, with respect to ease of decryption using frequency analysis.

A. random polyalphabetic , plaintext , playfair
B. random polyalphabetic , playfair , vignere
C. random polyalphabetic , vignere , playfair , plaintext
D. random polyalphabetic , plaintext , beaufort , playfair
Answer» C. random polyalphabetic , vignere , playfair , plaintext
27.

On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword “HUMOR” we get cipher text-

A. abqdnwewuwjphfvrrtrfzn sdokvl
B. abqdvmwuwjphfvvyyrf znydokvl
C. tbqyrvmwuwjphfvvyy rfznydokvl
D. baiuvmwuwjphfoeiyrf znydokvl
Answer» B. abqdvmwuwjphfvvyyrf znydokvl
28.

. Rail Fence Technique is an example of

A. substitution
B. transposition
C. product cipher
D. ceaser cipher
Answer» B. transposition
29.

Public key encryption is advantageous over Symmetric key Cryptography because of

A. speed
B. space
C. key exchange
D. key length
Answer» C. key exchange
30.

The sub key length at each round of DES is

A. 32
B. 56
C. 48
D. 64
Answer» B. 56
31.

Which one is the strong attack mechanism?

A. chosen plaintext attack
B. chosen cipher text
C. brute force attack
D. man in the middle attack
Answer» C. brute force attack
32.

Interception is an attack on

A. availability
B. confidentiality
C. integrity
D. authenticity
Answer» B. confidentiality
33.

Chosen cipher text attack is based on

A. cryptanalysis
B. cryptography
C. encryption
D. decryption
Answer» A. cryptanalysis
34.

The process of writing the text as rows and read it as columns is known as

A. vernam cipher
B. ceaser cipher
C. transposition columnar cipher
D. homophonic substitution cipher
Answer» C. transposition columnar cipher
35.

Biometric authentication works on the basis of

A. human characteristics
B. passwords
C. smart cards
D. pin
Answer» A. human characteristics
36.

Which layer filters the proxy firewall?

A. application
B. network
C. transport
D. none of the above
Answer» A. application
37.

Encryption Strength is based on

A. strength of algorithm
B. secrecy of key
C. length of key
D. all of the above
Answer» D. all of the above
38.

GCD(a,b) = GCD(b,a mod b)

A. true
B. false
C. cannot be determined
D. none
Answer» A. true
39.

All groups satisfy properties

A. g-i to g-v
B. g-i to g-iv
C. g-i to r-v
D. r-i to r-v
Answer» C. g-i to r-v
40.

An Abelian Group satisfies the properties

A. g-i to g-v
B. g-i to g-iv
C. g-i to r-v
D. r-i to r-v
Answer» A. g-i to g-v
41.

A Ring satisfies the properties

A. r-i to r-v
B. g-i to g-iv
C. g-i to r-v
D. g-i to r-iii
Answer» D. g-i to r-iii
42.

A Ring is said to be commutative if it also satisfies the property

A. r-vi
B. r-v
C. r-vii
D. r-iv
Answer» D. r-iv
43.

An ‘Integral Domain’ satisfies the properties

A. g-i to g-iii
B. g-i to r-v
C. g-i to r-vi
D. g-i to r-iii
Answer» C. g-i to r-vi
44.

Does the set of residue classes (mod 3) form a group with respect to modular addition?

A. yes
B. no
C. can\t say
D. insufficient data
Answer» A. yes
45.

For the group Sn of all permutations of n distinct symbols, what is the number of elements in Sn?

A. n
B. n-1
C. 2n
D. n!
Answer» D. n!
46.

a(b+c) = ac+bc is the representation for which property?

A. g-ii
B. g-iii
C. r-ii
D. r-iii
Answer» D. r-iii
47.

a.(b.c) = (a.b).c is the representation for which property?

A. g-ii
B. g-iii
C. r-ii
D. r-iii
Answer» A. g-ii
48.

AES uses a                             bit block size and a key size of                        bits.

A. 128; 128 or 256
B. 64; 128 or 192
C. 256; 128, 192, or 256
D. 128; 128, 192, or 256
Answer» D. 128; 128, 192, or 256
49.

Like DES, AES also uses Feistel Structure.

A. true
B. false
C. cannot be determined
D. none
Answer» B. false
50.

Which one of the following is not a cryptographic algorithm?

A. jupiter
B. blowfish
C. serpent
D. none
Answer» A. jupiter

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.