Você está na página 1de 6

SRI RAMAKRISHNA ENGINEERING COLLEGE Coimbatore -22 DEPARTMENT OF INFORMATION TECHNOLOGY 07AF505 Network Security Objective Type Questions

s Class : III B-Tech IT A-section 1. How many keys are used in symmetric key cryptography a) 1 b) 2 c) none d) 3 Sem : 5

a)

2. Release of message contents is a a) passive attack b ) active attack c) attack on integrity d) brute-force attack 3. Which of the following is not an active attack Masquerade b)Traffic Analysis c)Replay d)Denial of Service 4. What is the key space for Caesar cipher a) 25 b)26! c) 225 d) 252 5. Steganography a) authenticates the message b)encrypts the message b) conceals the message d) scrambles the message 6. How many rounds of operation does DES consist? a) 20 b)16 c)64 d) 48 7. The security of DES depends on a) key size b) number of rounds c) non-linearity of S-boxes d) all the above 8. Avalanche effect produces a) unbreakable cipher b) authenticated code c) large change in CT even if there is a small change in PT d) none of the above 9. ECB is only suitable for a) General Purpose Block Oriented Transmission b) Authentication c) Encrypting short amount of data d) High speed requirements 10. Evaluation Criteria for first round of AES include a) Cost b) Security c) Algorithm and Implementation Characteristics d) All the above 11. Double DES is susceptible to a) man-in-the-middle attack b) replay attack c) Denial of Service attack d) Meet-in-the-middle attack

12. Traffic padding is a counter measure for a) Replay attacks b) Traffic analysis c) Timing attacks d) Message Interception 13. Public key encryption is also known as a) Asymmetric key encryption b) Symmetric key encryption c) Single key encryption d) Conventional key encryption 14. The following is an application of public key cryptography a) Digital Signature b) Encryption c) Key Exchange d) All the above 15. Diffie-Hellman algorithm can be used for a) Encryption b) Decryption c) Digital Signature d) Key Exchange 16. Encrypting with public key of the receiver provides a) Digital Signature b) Confidentiality c) Non-Repudiation d) Authentication 17. Diffie Hellman algorithm is based on a) Eulers Theorem b) Prime Numbers c) Fermats Theorem d) Discrete Logarithms 18. Relatively prime numbers are a) Primitive roots b) Gcd = 1 c) Prime numbers d) Discrete logarithms 19. The key which is shared by the Key distribution centre and the participating entity is called a) Master key b) Hierarchical key c) Session key d) Secret key 20. Which algorithm is used for testing primality of a number a) Miller Rabins algorithm b) RSA algorithm c) IDEA d) Blowfish 21. Public announcement for public keys is susceptible to a) forgery

b) impersonation c) confidentiality attacks d) all the above 22. Elliptic curve a) is defined by a cubic equation b) oval shaped curve c) asymmetric along the y-axis d) follows finite arithmetic 23. ECC is an analog of a) RSA algorithm b) DSS c) Diffie-Hellman d) DES 24. Sequence modification attacks is a) delaying or replaying the messages b) denial of transmission c) reordering the messages d) changing the content 25. Which message digest technique makes use of a secret key? a) Hashing b) MAC c) c) both (a) and (b) d) d) none of the above 26. Which of the following properties are requirements for a hash function a) one-way property b) weak collision resistance c) strong collision resistance d) all the above 27. MD5 uses a) Little-endian format b) big-endian format c) ASN.1 d) ASCII 28. The message digest size is SHA-1 is _______ bits a) 512 b) 128 c) 160 d) 1024 29. The number of rounds of processing in RIPEMD is a) 10 b) 5 c) 4 d) 16 30. Which of the following is true about HMAC a) Handles keys in a complicated fashion b) Does not allow replaceability of Hash function c) Makes use of existing Hash functions d) ipad is repeated 2 times

31. Which signature method forward messages through a trusted third party a) Direct Digital Signature b) Arbitrated Digital Signature c) RSA signature d) None of the above 32. Which of the following is a replay attack? a) Repetition that can be logged b) Repetition that cannot be detected c) Backward replay d) All the above 33. One way authentication is applicable to a) e-mail b) file transfer c) telephone calls d) none of the above 34. Digital signature using DSS approach has ______ number of components a)1 b) 3 c) 2 d) 0

35. Kerberos is a) an encryption algorithm b) digital signature methodology c) Hashing function d) Central authentication Server 36. The requirements for Kerberos include a) Security b) Reliability c) Transparency d) All the above 37. Kerberos Version 4 tickets are a) reusable b) required for every service c) provides mutual authentication d) password has to be re-entered many times 38. X.509 V3 certificate revocation is issued when a) certificate is expired b) secret key is compromised c) communicating entity is trusted d) none of the above

39. Which protocol is used for security in e-mail applications a) PGP b) S/MIME c) a) and b) d) None of the above 40. Which method is used for e-mail compatibility in PGP

a) Radix-64 b) Base-64 c) BCD d) ASCII codes 41. IPSec ________ provides both confidentiality and authentication a) ESP b) AH c) IPv6 d) None of the above 42. Which mode provides security from traffic analysis a) transport mode b) tunnel mode c) both the above d) none of the above 43. Which protocol provides security at the transport level a) Secure socket layer b) IPSec c) S/MIME d) PGP 44. Which protocol is used to secure credit card transactions a) SET b) TSL c) IPSec d) SMTP 45. Small files that are deposited on a users hard drive when they visit a Web site are called a) b) c) d) cookies codes profiles trackers

46. A program that migrates through networks and operating systems by attaching itself to different programs and databases is a a) b) c) d) virus worm denial-of-service attack damage

47. Programs that come into a computer system disguised as something else are called a) spoofers b) Loggers c) Defacers d) Trojan Horses 48. A clandestine user a) impersonates another valid user b) misuses privileges

c) gains supervisory control of the system d) none of the above 49. Honeypot a) contains sweet information b) used to divert intruders c) virus d) Trojan horse 50. Firewalls a) check all incoming and outbound packets b) is implemented at the router or proxy server c) follows a set of rules d) all the above

Você também pode gostar