Network Security - Quiz 1 - BITS WILP - Mtec Software Systems - 2017

Network Security - Quiz 1
BITS WILP - Mtec Software Systems - 2017

1. Cryptography provides security through obscurity.
Select one:
 True
 False

Ans: False

2. Security level of the cipher  does not increases by multiple substitution encryption.
Select one:
 True
 False

Ans: True

3. There are 8 equivalence class for the modulus 7
Select one:
 True
 False

Ans: False

4. In a symmetric cipher, different key are used by  the sender and receiver.
Select one:
 True
 False

Ans: False

5. Range of possible values used to construct keys is called key space.
Select one:
 True
 False

Ans: True

6. Security Services integrity assures that data received is a as sent by an authorized entity.
Select one:
 True
 False

Ans: True

7. There are 5 equivalence class for the modulus 5
Select one:
 True
 False

Ans: False

8. In symmetric cipher same key is used by  the sender and receiver.
Select one:
 True
 False

Ans: True

9. Security services authentication assures that the communicating entity is the one claimed.
Select one:
 True
 False

Ans: True

10. Security level of the encrypted message increases by multiple encrypting the message with a substitution cipher.
Select one:
 True
 False

Ans: False

11. Stream ciphers encrypt bits individually.
Select one:
 True
 False

Ans: True

12. Security level of the cipher  does not increases by multiple substitution encryption.
Select one:
 True
 False

Ans: True

13. Plaintext is the data before transformation.
Select one:
 True
 False
Ans : True

14. According to kerchoff's principle, a cryptosystem should be secure even if the attacker knows all details about the system, with the exception of the secret key.
Select one:
 True
 False

Ans: True

15. The ciphertext is the message after transformation.
Select one:
 True
 False

Ans: True

16. Security services non-repudiation protect against denial by one of the parties in a communication.
Select one:
 True
 False

Ans: True

17. A cryptosystem is unconditionally secure if it cannot be broken even with infinite computational resources.
Select one:
 True
 False

Ans: True

18. There are 7 equivalence class for the modulus 8
Select one:
 True
 False

Ans: False


19. According to kerchoff's principle, the attacker should not know the encryption and decryption algorithm.
Select one:
 True
 False

Ans: False

20. Stream ciphers encrypt bits individually.
Select one:
 True
 False

Ans: True

No comments:

Post a Comment