MVJ College of Engineering: Department of Computer Science and Engineering Academic Year 2018-19 Even Assignment-2

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

MVJ COLLEGE OF ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


ACADEMIC YEAR 2018-19 EVEN

Assignment-2

CRYPTOGRAPHY
SUBJECT SUBJECT NETWORK
SEMESTER 6 15CS61
CODE NAME SECURITY AND
CYBER LAWS

SL MCQ QUESTIONS CO PO
NO LEVEL LEVEL

1 On Encrypting “thepepsiisintherefrigerator”using Vignere Cipher System


using the keyword “HUMOR” we get cipher text.

a. abqdnwewuwjphfvrrtrfznsdokvl

b. abqdvmwuwjphfvvyyrfznydokvl
c. tbqyrvmwuwjphfvvyyrfznydokvl
d. baiuvmwuwjphfoeiyrfznydokvl

2 The plain text for the cipher text RRLMWBKASPDH.

Given the encryption key [(17 17 5 | 21 18 21 | 2 2 19)] is –


a. PAYMOREMONEY
b. PAYINGRANSOM
c. GETINTHECAB

d. THEEXPRESSID

3 In DES algorithm the Round Input is 32 bits, which is expanded to 48


bits via ______________
a. Scaling of the existing bits
b. Duplication of the existing bits

c. Addition of zeros
d. Addition of ones

4 A substitution cipher substitutes one symbol with

a. Keys
b. Others
c. Multi Parties
d. Single Party

5 We We use Cryptography term to transforming messages to make them secure


and immune to

a. Change
b. Idle
c. Attacks
d. Defend

6 T The man-in-the-middle attack can endanger the security of the


Diffie-Hellman method if two parties are not
a. Authenticated
b. Joined
c. Submit

d. Separate

7 The substitutional cipers are


a. Monoalphabatic
b. Sami alphabetic
c. polyalphabetic
d. both a and c

8 For RSA to work, the value of P must be less than the value of
a. P b. q c. n d. e
9 The MD5 is a message digest algorithm developed by ______.
a. Ron Rivest.

b. WhiteField Diffie.
c. Martin Hellman.
d. Diffie-Hellman.

10 IKE creates SAs for _____. A)SSL B)PGP C)IPSec D)VP

11 ______ provides either authentication or encryption, or both, for packets


at the IP level. A)AH B)ESP C)PGP D)SSL

12 One security protocol for the e-mail system is _________. A. IPSec


B)SSL C)PGP D)none of the above

13 IPSec defines two protocols: _______ and ________.


A) AH; SSL B) PGP; ESP C) AH; ESP D) all of the above

14 A modern cipher is usually a complex _____cipher made of a


combination of different simple ciphers.
A)round B)circle C)square D)none of the above

15 ______ is the protocol designed to create security associations, both


inbound and outbound. A)SA B)CA C)KDC D)IKE

16 The Internet authorities have reserved addresses for _______.


A)intranets B)internets C)extranets D)none of the above

17 An _________ is a network that allows authorized access from outside


users. A)intranet B)internet C)extranet D)none of the above

18 _________ is a collection of protocols designed by the IETF (Internet


Engineering Task Force) to provide security for a packet at the network
level. A)IPSec B)SSL C)PGP D)none of the above

19 In ______, there is a single path from the fully trusted authority to any
certificate.
A)X509 B)PGP C)KDC D)none of the above

20 A ______ provides privacy for LANs that must communicate through the
global Internet. A)VPP B)VNP C)VNN D)VPN

21 IPSec in the ______ mode does not protect the IP header.


A)transport B)tunnel C)either (a) or (b) D)neither (a) nor (b)

22 A _______ layer security protocol provides end-to-end security services


for applications.
A)data link B)network C)transport D)none of the above
23 The ________ method provides a one-time session key for two parties.
A)Diffie-Hellman B)RSA C)DES D)AES

24 AES has _____ different configurations.


A)two B)three C)four D)five

25 DES uses a key generator to generate sixteen _______ round keys.


A)32-bit B)48-bit C)54-bit D)42-bit

You might also like