Cns
Cns
1. The need for security arises due to various ________ (attacks/services) in the digital
world.
2. ________ (Security/Privacy) approaches help protect sensitive information from
unauthorized access.
3. One of the main principles of security is ________ (confidentiality/privacy).
4. ________ (Integrity/Confidentiality) ensures that data has not been altered in transit.
5. Security mechanisms include ________ (firewalls/encryption) and authentication.
6. A model for ________ (Network/Web) Security helps define the requirements for
protecting network systems.
7. ________ (Ciphertext/Plaintext) refers to unencrypted data.
8. ________ (Ciphertext/Plaintext) is the encrypted form of data.
9. Substitution techniques in cryptography replace each element in the text with ________
(another/the same) element.
10. Encryption and decryption are methods for converting plaintext into ________
(ciphertext/metadata) and vice versa.
11. Symmetric key cryptography uses the ________ (same/different) key for both encryption
and decryption.
12. Asymmetric key cryptography uses ________ (one/two) keys: one for encryption and one
for decryption.
13. ________ (Steganography/Cryptography) is the practice of hiding information within
other non-secret text or data.
14. The ________ (key range/key size) determines the strength of a cryptographic system.
15. ________ (Brute-force/Dictionary) attacks try all possible key combinations to decrypt
data.
16. The principles of block ciphers include ________ (substitution/iteration) and diffusion.
17. DES stands for ________ (Data Encryption/Digital Encoding) Standard.
18. AES is also known as ________ (Advanced Encryption/Affordable Encoding) Standard.
19. ________ (Blowfish/IDEA) is a symmetric-key block cipher designed for fast
encryption.
20. Stream ciphers encrypt data ________ (bit-by-bit/block-by-block).
21. RC4 is an example of a ________ (stream/block) cipher.
22. Public key cryptography relies on a pair of ________ (private/public) and private keys.
23. The ________ (RSA/RC4) algorithm is widely used for secure data transmission in
public key cryptosystems.
24. The Diffie-Hellman algorithm is used for ________ (key exchange/data encryption).
25. The ________ (Knapsack/Blowfish) algorithm is an example of a public key
cryptosystem.
26. SHA-512 is an example of a ________ (hash/message) algorithm used for data integrity.
27. Cryptographic hash functions ensure ________ (data confidentiality/message integrity).
28. ________ (MAC/HMAC) is a message authentication code that uses a cryptographic
hash function with a secret key.
29. Digital signatures verify the ________ (authenticity/integrity) of digital messages.
30. The ElGamal Digital Signature Scheme is based on ________ (asymmetric/symmetric)
cryptography.
31. ________ (Symmetric/Asymmetric) Key Distribution techniques involve the same key
for encryption and decryption.
32. Kerberos is a network authentication protocol using ________ (symmetric/asymmetric)
cryptography.
33. The X.509 Authentication Service is based on ________ (public/private) key
infrastructure.
34. HMAC stands for ________ (Hashed Message Authentication Code/High Message
Access Control).
35. Public Key Infrastructure (PKI) supports the distribution of ________ (public/private)
keys in cryptographic systems.
36. Key management and distribution are essential to ensure ________
(confidentiality/integrity) in a secure system.
37. A cryptographic hash function transforms input data of any size into a ________
(fixed/variable) size.
38. ________ (Encryption/Message Authentication Codes) verify that a message has not
been tampered with.
39. SHA-512 is part of the ________ (SHA-1/SHA-2) family of secure hash algorithms.
40. The process of ________ (signing/encrypting) a message ensures that it came from a
verified source.