0% found this document useful (0 votes)
7 views

Cns

Uploaded by

kavyadixith66
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Cns

Uploaded by

kavyadixith66
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

UNIT - I: Security Concepts and Cryptography Concepts and Techniques

1. Which of the following is NOT a type of security attack?


o A) Passive Attack
o B) Active Attack
o C) Insecure Transmission
o D) Man-in-the-Middle Attack
2. Which principle is focused on preventing unauthorized access to information?
o A) Confidentiality
o B) Integrity
o C) Availability
o D) Authentication
3. A method of encoding data to prevent unauthorized access is called:
o A) Cryptography
o B) Steganography
o C) Decryption
o D) Transposition
4. In cryptography, the original message is known as:
o A) Plaintext
o B) Ciphertext
o C) Key
o D) Code
5. Which technique involves rearranging characters in a message?
o A) Substitution
o B) Transposition
o C) Permutation
o D) Stenography
6. Symmetric cryptography requires:
o A) One private key
o B) Two public keys
o C) One public and one private key
o D) None of the above
7. Which term refers to hiding a message within another medium, like an image?
o A) Cryptography
o B) Steganography
o C) Encoding
o D) Encryption
8. What type of key is used in asymmetric encryption?
o A) Symmetric Key
o B) Public and Private Key Pair
o C) Hash Key
o D) None of the above
9. The process of converting plaintext into ciphertext is known as:
o A) Decryption
o B) Encryption
o C) Encoding
o D) Decoding
10. A model for Network Security primarily focuses on:
o A) Confidentiality
o B) Availability
o C) Integrity
o D) All of the above
11. Which attack involves intercepting and possibly altering information during
transmission?
o A) Passive Attack
o B) Active Attack
o C) Replay Attack
o D) Man-in-the-Middle Attack
12. Which cryptographic technique uses both substitution and transposition methods?
o A) Symmetric Key Cryptography
o B) Asymmetric Key Cryptography
o C) Hybrid Cryptography
o D) Public Key Cryptography

UNIT - II: Symmetric and Asymmetric Key Ciphers

13. Which of the following is a symmetric key cipher?


o A) RSA
o B) DES
o C) ElGamal
o D) Knapsack Algorithm
14. DES stands for:
o A) Digital Encryption Standard
o B) Data Encryption System
o C) Data Encryption Standard
o D) Data Encoding System
15. AES is known for using which type of cipher method?
o A) Block Cipher
o B) Stream Cipher
o C) Public Key Cipher
o D) Hash Cipher
16. Which of the following is an example of a stream cipher?
o A) DES
o B) AES
o C) RC4
o D) Blowfish
17. The RSA algorithm is based on which principle?
o A) Symmetric Key Cryptography
o B) Asymmetric Key Cryptography
o C) Stream Cipher
o D) Block Cipher
18. Which cipher is NOT considered symmetric?
o A) AES
o B) DES
o C) RSA
o D) Blowfish
19. Diffie-Hellman is primarily used for:
o A) Encrypting Data
o B) Key Exchange
o C) Message Integrity
o D) Digital Signatures
20. The Knapsack Algorithm is associated with which type of cryptography?
o A) Symmetric
o B) Asymmetric
o C) Hybrid
o D) None of the above
21. Which symmetric key cipher is known for its simplicity and high speed in
hardware?
o A) RC5
o B) AES
o C) Blowfish
o D) IDEA
22. The Block Cipher principle primarily divides:
o A) Plaintext into blocks
o B) Ciphertext into blocks
o C) Keys into segments
o D) Encrypted data into streams
23. Which cryptographic algorithm is widely used for secure online communications?
o A) Knapsack
o B) DES
o C) RSA
o D) RC4

UNIT - III: Cryptographic Hash Functions and Key Management

24. The SHA-512 algorithm is used in:


o A) Symmetric Encryption
o B) Asymmetric Encryption
o C) Hash Functions
o D) Digital Signatures
25. What does HMAC stand for?
o A) Hashed Message Authentication Code
o B) Hybrid Message Access Control
o C) Header Message Authentication Code
o D) High-level Message Authentication Control
26. Which algorithm provides message authentication and integrity?
o A) AES
o B) DES
o C) HMAC
o D) RSA
27. The ElGamal signature scheme is primarily used for:
o A) Data Encryption
o B) Digital Signatures
o C) Key Distribution
o D) Message Authentication
28. Which key management method uses both symmetric and asymmetric encryption?
o A) Kerberos
o B) Public Key Infrastructure
o C) Hybrid Key Exchange
o D) Symmetric Key Distribution
29. Which of the following is NOT a digital signature algorithm?
o A) ElGamal
o B) HMAC
o C) RSA
o D) DSA
30. X.509 is commonly associated with:
o A) Key Exchange
o B) Digital Certificates
o C) Symmetric Encryption
o D) Hashing
31. Public Key Infrastructure (PKI) is used for:
o A) Generating symmetric keys
o B) Managing public and private keys
o C) Encrypting files only
o D) Distributing hashing algorithms
32. Which hash function algorithm is used to produce a 512-bit hash value?
o A) SHA-256
o B) SHA-1
o C) MD5
o D) SHA-512
33. The primary purpose of message authentication codes is to ensure:
o A) Confidentiality
o B) Integrity
o C) Availability
o D) Key Distribution
34. Kerberos is a protocol used for:
o A) Data Encryption
o B) Key Management
o C) Authentication Service
o D) Digital Signatures
35. Which of the following is a requirement for message authentication?
o A) Key Exchange
o B) Confidentiality
o C) Integrity
o D) Availability
36. Which component is NOT typically part of Public Key Infrastructure (PKI)?
o A) Certificate Authority
o B) Registration Authority
o C) Digital Signatures
o D) HMAC
37. A digital signature primarily provides:
o A) Confidentiality
o B) Integrity and Authentication
o C) Availability
o D) Encryption
38. The purpose of Secure Hash Algorithm (SHA) is:
o A) Encryption
o B) Decryption
o C) Hashing
o D) Key Generation
39. In key distribution, symmetric key distribution using asymmetric encryption
ensures:
o A) Faster processing
o B) Higher security
o C) Less memory usage
o D) Compatibility with symmetric keys
40. Message Authentication Codes (MAC) are mainly used to:
o A) Encrypt data
o B) Authenticate data
o C) Generate keys
o D) Verify public keys
UNIT - I: Security Concepts and Cryptography Concepts and Techniques

1. The need for security arises due to various ________ (attacks/services) in the digital
world.
2. ________ (Security/Privacy) approaches help protect sensitive information from
unauthorized access.
3. One of the main principles of security is ________ (confidentiality/privacy).
4. ________ (Integrity/Confidentiality) ensures that data has not been altered in transit.
5. Security mechanisms include ________ (firewalls/encryption) and authentication.
6. A model for ________ (Network/Web) Security helps define the requirements for
protecting network systems.
7. ________ (Ciphertext/Plaintext) refers to unencrypted data.
8. ________ (Ciphertext/Plaintext) is the encrypted form of data.
9. Substitution techniques in cryptography replace each element in the text with ________
(another/the same) element.
10. Encryption and decryption are methods for converting plaintext into ________
(ciphertext/metadata) and vice versa.
11. Symmetric key cryptography uses the ________ (same/different) key for both encryption
and decryption.
12. Asymmetric key cryptography uses ________ (one/two) keys: one for encryption and one
for decryption.
13. ________ (Steganography/Cryptography) is the practice of hiding information within
other non-secret text or data.
14. The ________ (key range/key size) determines the strength of a cryptographic system.
15. ________ (Brute-force/Dictionary) attacks try all possible key combinations to decrypt
data.

UNIT - II: Symmetric and Asymmetric Key Ciphers

16. The principles of block ciphers include ________ (substitution/iteration) and diffusion.
17. DES stands for ________ (Data Encryption/Digital Encoding) Standard.
18. AES is also known as ________ (Advanced Encryption/Affordable Encoding) Standard.
19. ________ (Blowfish/IDEA) is a symmetric-key block cipher designed for fast
encryption.
20. Stream ciphers encrypt data ________ (bit-by-bit/block-by-block).
21. RC4 is an example of a ________ (stream/block) cipher.
22. Public key cryptography relies on a pair of ________ (private/public) and private keys.
23. The ________ (RSA/RC4) algorithm is widely used for secure data transmission in
public key cryptosystems.
24. The Diffie-Hellman algorithm is used for ________ (key exchange/data encryption).
25. The ________ (Knapsack/Blowfish) algorithm is an example of a public key
cryptosystem.

UNIT - III: Cryptographic Hash Functions, Message Authentication Codes, and


Key Management

26. SHA-512 is an example of a ________ (hash/message) algorithm used for data integrity.
27. Cryptographic hash functions ensure ________ (data confidentiality/message integrity).
28. ________ (MAC/HMAC) is a message authentication code that uses a cryptographic
hash function with a secret key.
29. Digital signatures verify the ________ (authenticity/integrity) of digital messages.
30. The ElGamal Digital Signature Scheme is based on ________ (asymmetric/symmetric)
cryptography.
31. ________ (Symmetric/Asymmetric) Key Distribution techniques involve the same key
for encryption and decryption.
32. Kerberos is a network authentication protocol using ________ (symmetric/asymmetric)
cryptography.
33. The X.509 Authentication Service is based on ________ (public/private) key
infrastructure.
34. HMAC stands for ________ (Hashed Message Authentication Code/High Message
Access Control).
35. Public Key Infrastructure (PKI) supports the distribution of ________ (public/private)
keys in cryptographic systems.
36. Key management and distribution are essential to ensure ________
(confidentiality/integrity) in a secure system.
37. A cryptographic hash function transforms input data of any size into a ________
(fixed/variable) size.
38. ________ (Encryption/Message Authentication Codes) verify that a message has not
been tampered with.
39. SHA-512 is part of the ________ (SHA-1/SHA-2) family of secure hash algorithms.
40. The process of ________ (signing/encrypting) a message ensures that it came from a
verified source.

You might also like