Network Security - Quiz 1
BITS WILP - Mtec Software Systems - 2017
1. Cryptography provides security through obscurity.
Select one:
True
False
Ans: False
2. Security level of the cipher does not increases by multiple substitution encryption.
Select one:
True
False
Ans: True
3. There are 8 equivalence class for the modulus 7
Select one:
True
False
Ans: False
4. In a symmetric cipher, different key are used by the sender and receiver.
Select one:
True
False
Ans: False
5. Range of possible values used to construct keys is called key space.
Select one:
True
False
Ans: True
6. Security Services integrity assures that data received is a as sent by an authorized entity.
Select one:
True
False
Ans: True
7. There are 5 equivalence class for the modulus 5
Select one:
True
False
Ans: False
8. In symmetric cipher same key is used by the sender and receiver.
Select one:
True
False
Ans: True
9. Security services authentication assures that the communicating entity is the one claimed.
Select one:
True
False
Ans: True
10. Security level of the encrypted message increases by multiple encrypting the message with a substitution cipher.
Select one:
True
False
Ans: False
11. Stream ciphers encrypt bits individually.
Select one:
True
False
Ans: True
12. Security level of the cipher does not increases by multiple substitution encryption.
Select one:
True
False
Ans: True
13. Plaintext is the data before transformation.
Select one:
True
False
Ans : True
14. According to kerchoff's principle, a cryptosystem should be secure even if the attacker knows all details about the system, with the exception of the secret key.
Select one:
True
False
Ans: True
15. The ciphertext is the message after transformation.
Select one:
True
False
Ans: True
16. Security services non-repudiation protect against denial by one of the parties in a communication.
Select one:
True
False
Ans: True
17. A cryptosystem is unconditionally secure if it cannot be broken even with infinite computational resources.
Select one:
True
False
Ans: True
18. There are 7 equivalence class for the modulus 8
Select one:
True
False
Ans: False
19. According to kerchoff's principle, the attacker should not know the encryption and decryption algorithm.
Select one:
True
False
Ans: False
20. Stream ciphers encrypt bits individually.
Select one:
True
False
Ans: True
No comments:
Post a Comment