Professional Documents
Culture Documents
10.00 Out of 10.00 (100%)
10.00 Out of 10.00 (100%)
Question 1 In DES how many bits of key has been used by the fiestal round?
Complete
b. 64
c. 56
d. 48
Question 2 What are the two possible attack will be used by the hacker?
Complete
Question 3 In block cipher data is encrypted using AES in the form of_______
Complete
b. 8 bits
c. 32 bits
d. 64 bits
Question 5 How many fiestal rounds has been used by DES algorithm?
Complete
b. 16
c. 12
d. 10
https://su.euniv.in/mod/quiz/review.php?attempt=230352&cmid=73137 1/3
11/17/21, 11:20 AM Quiz3
Question 6 If a third party is acting as a sender while sending message through the network then this is known as______
Complete
c. Replay attack
d. Release of message
b. 64
c. 128
d. 192
Question 8 What are the property that specifies the numbers are relative prime?
Complete
b. RSA
c. DES
d. RC4
b. Private Key
c. Asymmetric key
d. Symmetric Key
https://su.euniv.in/mod/quiz/review.php?attempt=230352&cmid=73137 2/3