Computer Hardware and Networking/Information and Network Security Set 2 Sample Test,Sample questions

Question:
 DES follows_________.

1.SP Networks

2.Feistel Cipher Structure

3.Caesars Cipher

4.Hash Algorithm

Posted Date:-2022-07-18 06:01:16


Question:
 How many round keys are generated in the AES algorithm?

1. 12

2.11

3.10

4.8

Posted Date:-2022-07-18 05:58:00


Question:
 In AES the 4×4 bytes matrix key is transformed into a keys of size __________.

1. 60 words

2.32 words

3.52 words

4. 44 words

Posted Date:-2022-07-17 12:39:00


Question:
 In an RSA system the public key of a given user is e = 31, n = 3599. What is the privatekey of this user?

1.1023

2.2432

3.2412

4.3031

Posted Date:-2022-07-18 06:10:37


Question:
 In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via____________.

1.Addition of ones

2. Addition of zeros

3.Duplication of the existing bits

4.Scaling of the existing bits

Posted Date:-2022-07-18 06:05:04


Question:
 In the DES algorithm the round key is __________ bit and the Round Input is ____________bits.

1.48, 32

2.32, 32

3.56, 24

4.64,32

Posted Date:-2022-07-18 06:03:56


Question:
 Perform encryption on the following PT using RSA and find the CT. p = 11; q = 13;M = 7.

1. 78

2.45

3.124

4.25

Posted Date:-2022-07-18 06:19:15


Question:
 Perform encryption on the following PT using RSA and find the CT. p = 3; q = 11; M= 5.

1.18

2.12

3.26

4.28

Posted Date:-2022-07-18 06:17:15


Question:
 The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.

1. 16

2.9

3.12

4.18

Posted Date:-2022-07-18 06:02:01


Question:
 What is the block size in the Simplified AES algorithm?

1.36 bits

2.16 bits

3.40 bits

4. 8 bits

Posted Date:-2022-07-17 12:47:06


Question:
 Which mode requires the implementation of only the encryption algorithm?

1.OF

2.B CTR

3.CBC

4.ECB

Posted Date:-2022-07-17 12:26:47


Question:
 Which of the following modes of operation does not involve feedback?

1.OF

2.B CTR

3.CBC

4.ECB

Posted Date:-2022-07-17 12:27:38


Question:
. What is the block size in the Simplified AES algorithm?

1. 36 bits

2.16 bits

3.40 bits

4.8 bits

Posted Date:-2022-07-17 12:51:26


Question:
By using ______________ you can diminish the chance of data leakage.

1.Steganography

2.Chorography

3.Tomography

4.Cryptography

Posted Date:-2022-07-17 12:23:47


Question:
Compute private key (d, p, q) given public key (e=23, n=233 ´ 241=56,153).

1. 32432

2.19367

3.12543

4.35212

Posted Date:-2022-07-18 06:11:27


Question:
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Ciphermessage=11 and thus find the plain text.

1.122

2.143

3.111

4.88

Posted Date:-2022-07-18 06:09:53


Question:
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88and thus find the CT.

1.64

2.11

3.64

4.23

Posted Date:-2022-07-18 06:09:16


Question:
For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher message=80 and thus find the plain text.

1.5

2.12

3.43

4.54

Posted Date:-2022-07-18 06:16:38


Question:
For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 andfind the cipher text.

1.C=23

2. C=56

3.C=92

4. C=80

Posted Date:-2022-07-18 06:15:51


Question:
For the AES-128 algorithm there are __________ similar rounds and _________ roundis different.

1.9 ; the last

2. 8 ; the first and last

3.10 ; no

4.2 pair of 5 similar rounds ; every alternate

Posted Date:-2022-07-17 12:41:02


Question:
How many computation rounds does the simplified AES consists of?

1.10

2.8

3.2

4.5

Posted Date:-2022-07-17 12:45:17


Question:
How many rounds does the AES-192 perform?

1.16

2.12

3.14

4.10

Posted Date:-2022-07-17 12:32:16


Question:
How many step function do Round 1 and 2 each have in S-AES?

1.1 and 4

2.3 and 4

3.Both 4

4.4 and 3

Posted Date:-2022-07-17 13:01:08


Question:
In RSA, Ф(n) = _______ in terms of p and q.

1.(p+1)(q+1)

2.(p-1)(q-1)

3. (p)(q)

4.(p)/(q)

Posted Date:-2022-07-18 06:14:31


Question:
In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?

1.p/q should give no remainder

2.p and q should be prime

3.p and q should be co-prime

4.p and q should be divisible by Ф(n)

Posted Date:-2022-07-18 06:13:33


Question:
n = 35; e = 5; C = 10. What is the plaintext (use RSA)?

1.2

2.4

3.5

4.6

Posted Date:-2022-07-18 06:20:24


Question:
On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?

1.Permutation P

2.Swapping of halves

3.XOR of subkey with function f

4.F function

Posted Date:-2022-07-17 12:46:12


Question:
People will normally think it as a normal/regular file and your secret message will pass on without any _____________

1. Cracking

2.Decryption

3.Suspicion

4.Encryption

Posted Date:-2022-07-17 12:22:56


Question:
Perform encryption on the following PT using RSA and find the CT. p = 5; q = 11; M= 9.

1.43

2.14

3.112

4. 54

Posted Date:-2022-07-18 06:17:54


Question:
Perform encryption on the following PT using RSA and find the CT. p = 7; q = 11; M= 8.

1.58

2.34

3.123

4.57

Posted Date:-2022-07-18 06:18:30


Question:
RSA is also a stream cipher like Merkel-Hellman.

1.True

2.False

3.none

4. all

Posted Date:-2022-07-18 06:12:22


Question:
The 4×4 byte matrices in the AES algorithm are called_____

1. Permutations

2.Transitions

3.Words

4.States

Posted Date:-2022-07-17 12:38:12


Question:
The DES algorithm has a key length of ______.

1. 16 Bits

2.32 Bits

3.64 Bits

4.128 Bits

Posted Date:-2022-07-18 06:02:55


Question:
The Initial Permutation table/matrix is of size _____.

1.4×8

2.8×8

3.12×8

4.16×8

Posted Date:-2022-07-18 06:06:01


Question:
The inverse transformation matrix times the forward transformation matrix equals the identity matrix.

1. True

2.False

3.none

4.all

Posted Date:-2022-07-18 05:57:09


Question:
The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.

1.Program file

2.Special file

3. Ordinary file

4. Encrypted file

Posted Date:-2022-07-17 12:21:50


Question:
The number of unique substitution boxes in DES after the 48 bit XOR operationare___.

1.4

2.8

3.12

4.16

Posted Date:-2022-07-18 06:06:43


Question:
The S-Box is used to provide confusion, as it is dependent on the unknown key.

1.True

2.False

3.none

4. all

Posted Date:-2022-07-18 06:08:25


Question:
There is an addition of round key before the start of the AES round algorithms.

1.True

2.False

3.none

4.All of the mentioned

Posted Date:-2022-07-17 12:42:07


Question:
What is the expanded key size of AES-192?

1.60 words

2.32 words

3.52 words

4.44 words

Posted Date:-2022-07-17 12:32:58


Question:
What is the key size in the S-AES algorithm?

1.32 bits

2.24 bits

3. 16 bits

4.None of the mentioned

Posted Date:-2022-07-17 12:52:54


Question:
What is the number of possible 3 x 3 affine cipher transformations?

1.840

2.168

3.1344

4.1024

Posted Date:-2022-07-18 06:07:39


Question:
Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen asthe AES algorithm?

1.Rijndael

2.RC6

3.Blowfish

4.MARS

Posted Date:-2022-07-17 12:31:23


Question:
Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution?

1.EC

2.B CB

3.CTR

4.OFB

Posted Date:-2022-07-17 12:25:50


Question:
Which mode of operation has the worst “error propagation” among the following?

1. EC

2.B CB

3.CBC

4.OFB

Posted Date:-2022-07-17 12:24:56


Question:
Which of the following is a faulty S-AES step function?

1.Mix Columns

2.Add round key

3.Byte substitution

4.Shift rows

Posted Date:-2022-07-17 12:53:43


Question:
Which of the following is a natural candidates for stream ciphers?

1.OF

2.B ECB

3.CBC

4.CFB

Posted Date:-2022-07-17 12:28:58


Question:
Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?

1. Rijndael

2.Serpent

3.Blowfish

4.JUPITER

Posted Date:-2022-07-17 12:30:41


More MCQS

  1. MCQ Questions from Computer Hardware Concept
  2. Computer Communication and Networking MCQS Quiz
  3. Computer Hardware Quiz Set 1
  4. Computer Hardware Quiz Set 2
  5. Computer Hardware Quiz Set 3
  6. Computer Hardware Quiz Set 4
  7. Computer Hardware Quiz Set 5
  8. Computer Hardware Quiz Set 6
  9. Computer Hardware Quiz Set 7
  10. Computer Hardware Quiz Set 8
  11. Computer Hardware Multiple Choice Questions(MCQs) and Answers
  12. Graphics Hardware and Display devices Input Devices
  13. Computer Hardware MCQ GK Questions Set 1
  14. Computer Hardware MCQ GK Questions Set 2
  15. Computer Hardware Multiple Choice Questions
  16. CDMA Multiple Choice Questions
  17. Network Security Multiple Choice questions
  18. Opengl Multiple Choice Questions
  19. Opengl Multiple Choice Questions.
  20. Web Development Multiple-choice Questions
  21. WiFi Multiple Choice Questions
  22. 4G Multiple Choice Question
  23. NETWORK MODELS MCQ
  24. INTERNET AND PROTOCOLS MCQ SET 1
  25. INTERNET AND PROTOCOLS MCQ SET 2
  26. INTERNET AND PROTOCOLS MCQ SET 3
  27. INTERNET AND PROTOCOLS MCQ SET 4
  28. INTERNET AND PROTOCOLS MCQ SET 5
  29. NETWORKING /PHYSICAL LAYER SET 1
  30. NETWORKING /PHYSICAL LAYER SET 2
  31. NETWORKING /PHYSICAL LAYER SET 3
  32. NETWORKING /PHYSICAL LAYER SET 4
  33. Information and Network Security Set 1
  34. Information and Network Security Set 2
  35. Information Cyber Security (ICS) MCQs Set 1
  36. Information Cyber Security (ICS) MCQs Set 2
  37. Information Cyber Security (ICS) MCQs Set 3
  38. Information Cyber Security (ICS) MCQs Set 4
  39. Information Cyber Security (ICS) MCQs Set 5
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!