MVJ COLLEGE OF ENGINEERING
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
ACADEMIC YEAR 2018-19 EVEN
Assignment-2
CRYPTOGRAPHY
SUBJECT SUBJECT NETWORK
SEMESTER 6 15CS61
CODE NAME SECURITY AND
CYBER LAWS
SL MCQ QUESTIONS CO PO
NO LEVEL LEVEL
1 On Encrypting “thepepsiisintherefrigerator”using Vignere Cipher System
using the keyword “HUMOR” we get cipher text.
a. abqdnwewuwjphfvrrtrfznsdokvl
b. abqdvmwuwjphfvvyyrfznydokvl
c. tbqyrvmwuwjphfvvyyrfznydokvl
d. baiuvmwuwjphfoeiyrfznydokvl
2 The plain text for the cipher text RRLMWBKASPDH.
Given the encryption key [(17 17 5 | 21 18 21 | 2 2 19)] is –
a. PAYMOREMONEY
b. PAYINGRANSOM
c. GETINTHECAB
d. THEEXPRESSID
3 In DES algorithm the Round Input is 32 bits, which is expanded to 48
bits via ______________
a. Scaling of the existing bits
b. Duplication of the existing bits
c. Addition of zeros
d. Addition of ones
4 A substitution cipher substitutes one symbol with
a. Keys
b. Others
c. Multi Parties
d. Single Party
5 We We use Cryptography term to transforming messages to make them secure
and immune to
a. Change
b. Idle
c. Attacks
d. Defend
6 T The man-in-the-middle attack can endanger the security of the
Diffie-Hellman method if two parties are not
a. Authenticated
b. Joined
c. Submit
d. Separate
7 The substitutional cipers are
a. Monoalphabatic
b. Sami alphabetic
c. polyalphabetic
d. both a and c
8 For RSA to work, the value of P must be less than the value of
a. P b. q c. n d. e
9 The MD5 is a message digest algorithm developed by ______.
a. Ron Rivest.
b. WhiteField Diffie.
c. Martin Hellman.
d. Diffie-Hellman.
10 IKE creates SAs for _____. A)SSL B)PGP C)IPSec D)VP
11 ______ provides either authentication or encryption, or both, for packets
at the IP level. A)AH B)ESP C)PGP D)SSL
12 One security protocol for the e-mail system is _________. A. IPSec
B)SSL C)PGP D)none of the above
13 IPSec defines two protocols: _______ and ________.
A) AH; SSL B) PGP; ESP C) AH; ESP D) all of the above
14 A modern cipher is usually a complex _____cipher made of a
combination of different simple ciphers.
A)round B)circle C)square D)none of the above
15 ______ is the protocol designed to create security associations, both
inbound and outbound. A)SA B)CA C)KDC D)IKE
16 The Internet authorities have reserved addresses for _______.
A)intranets B)internets C)extranets D)none of the above
17 An _________ is a network that allows authorized access from outside
users. A)intranet B)internet C)extranet D)none of the above
18 _________ is a collection of protocols designed by the IETF (Internet
Engineering Task Force) to provide security for a packet at the network
level. A)IPSec B)SSL C)PGP D)none of the above
19 In ______, there is a single path from the fully trusted authority to any
certificate.
A)X509 B)PGP C)KDC D)none of the above
20 A ______ provides privacy for LANs that must communicate through the
global Internet. A)VPP B)VNP C)VNN D)VPN
21 IPSec in the ______ mode does not protect the IP header.
A)transport B)tunnel C)either (a) or (b) D)neither (a) nor (b)
22 A _______ layer security protocol provides end-to-end security services
for applications.
A)data link B)network C)transport D)none of the above
23 The ________ method provides a one-time session key for two parties.
A)Diffie-Hellman B)RSA C)DES D)AES
24 AES has _____ different configurations.
A)two B)three C)four D)five
25 DES uses a key generator to generate sixteen _______ round keys.
A)32-bit B)48-bit C)54-bit D)42-bit