The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
A process of making the encrypted text readable again.
A.
Decryption
B.
Encryption
C.
Network Security
D.
Information Hiding
Correct Answer
A. Decryption
Explanation Decryption is the process of converting encrypted text back into its original readable form. It involves using a decryption algorithm or a secret key to reverse the encryption process and retrieve the original message. Decryption is an essential component of secure communication systems, as it allows authorized individuals to access and understand the encrypted information.
Rate this question:
2.
A small program that changes the way a computer operates.
A.
Worm
B.
Trojan
C.
Bomb
D.
Virus
Correct Answer
D. Virus
Explanation A virus is a small program that can infect a computer and alter its normal operations. It can replicate itself and spread to other computers, causing damage to files, corrupting data, and disrupting the functioning of the system. Unlike worms, which can spread independently, viruses typically require human interaction to spread, such as opening an infected email attachment or downloading a malicious file. Trojans and bombs are also malicious programs, but they do not necessarily change the way a computer operates like a virus does.
Rate this question:
3.
Ram chooses 7 and 11 as two prime numbers. He chooses 13 as the value of e. The ciphertext obtained using RSA algorithm is 26. What is the planintext?
Correct Answer 5
4.
Cryptanalysis is used __________
A.
To find some insecurity in a cryptographic scheme
B.
To increase the speed
C.
To encrypt the data
D.
To make new ciphers
Correct Answer
A. To find some insecurity in a cryptograpHic scheme
Explanation Cryptanalysis is the process of analyzing cryptographic systems in order to identify any weaknesses or vulnerabilities. It involves studying the algorithms, protocols, and implementations used in the cryptographic scheme to find potential flaws that could be exploited by attackers. By identifying these insecurities, cryptanalysts can help improve the security of the system and develop stronger cryptographic schemes.
Rate this question:
5.
Which one of the following is a cryptographic protocol used to secure HTTP connection?
A.
Stream control transmission protocol (SCTP)
B.
Transport layer security (TLS)
C.
Explicit congestion notification (ECN)
D.
Resource reservation protocol
Correct Answer
B. Transport layer security (TLS)
Explanation Transport Layer Security (TLS) is a cryptographic protocol used to secure HTTP connections. It provides authentication, confidentiality, and integrity for data transmitted over a network. TLS ensures that the communication between a client and a server is encrypted, preventing unauthorized access or tampering of data. It is commonly used in web browsers to establish secure connections for online transactions, sensitive data transfers, and secure communication between servers and clients.
Rate this question:
6.
If an end-to-end connection is made at a network or IP level, and there are 10 hosts, then what is the number of keys required?
Correct Answer 45
Explanation If end to end connection is done at a network or IP level, and there are 10 hosts, each host will need to have a unique key for communication. Since there are 10 hosts, the number of keys required will also be 10. Therefore, the answer of 45 is incorrect.
Rate this question:
7.
. When a hash function is used to provide message authentication, the hash function value is called to as:
Correct Answer Message Digest
Explanation When a hash function is used for message authentication, it generates a fixed-size output called the message digest. This message digest is a unique representation of the input message. It is used to verify the integrity of the message, as even a small change in the message will result in a completely different message digest. Therefore, the correct term to refer to the hash function value used for message authentication is "Message Digest".
Rate this question:
8.
Using Rabin cryptosystem with p=23 and q=7 Encrypt P=24 to find ciphertext. The Cipher text is
Correct Answer 93
Explanation In the Rabin cryptosystem, the encryption process involves raising the plaintext message (P) to the power of 2 and then taking the remainder when divided by the product of two prime numbers (p and q). In this case, p=23 and q=7. So, to encrypt P=24, we calculate (24^2) mod (23*7) which results in 576 mod 161 = 93. Therefore, the ciphertext is 93.
Rate this question:
9.
In the DES algorithm the round key is __________ bit and the Round Input is ____________bits.
A.
48, 32
B.
64,32
C.
56, 24
D.
32, 32
Correct Answer
A. 48, 32
Explanation In the DES algorithm, the round key is 48 bits long, which means it consists of 48 binary digits. The round input, on the other hand, is 32 bits long, meaning it consists of 32 binary digits.
Rate this question:
10.
In tunnel mode, IPSec protects the ______
A.
IP header
B.
IP trailer
C.
Entire IP packet
D.
IP payload
Correct Answer
C. Entire IP packet
Explanation In tunnel mode, IPSec protects the entire IP packet. This means that not only the IP header or payload, but also the IP trailer (if present) are encrypted and authenticated. Tunnel mode encapsulates the entire IP packet within a new IP packet, adding an additional layer of security. This ensures that the entire packet, including all its components, is protected from unauthorized access or modification during transmission.
Rate this question:
11.
Which component is included in IP security?
A.
Authentication Header (AH)
B.
Encapsulating Security Payload (ESP)
C.
Internet key Exchange (IKE)
D.
All of the mentioned
Correct Answer
D. All of the mentioned
Explanation IP security includes all of the mentioned components, namely Authentication Header (AH), Encapsulating Security Payload (ESP), and Internet Key Exchange (IKE). AH provides data integrity and authentication for IP packets, ESP provides confidentiality and integrity for IP packets, and IKE is used to establish and manage security associations between two IPsec peers. Therefore, all of these components are included in IP security.
Rate this question:
12.
A hash function guarantees the integrity of a message. It guarantees that the message has not be
A.
Replaced
B.
Over view
C.
Changed
D.
Violated
Correct Answer
C. Changed
Explanation A hash function guarantees the integrity of a message by generating a unique hash value for the message. This hash value is like a digital fingerprint of the message, and any change in the message will result in a different hash value. Therefore, if the hash value of a message remains the same, it means that the message has not been changed. Hence, the correct answer is "Changed" because a hash function guarantees that the message has not been changed.
Rate this question:
13.
The responsibility of certification authority for digital signature is to authenticate
A.
Hash function used
B.
Private key of the user
C.
Public key of the user
D.
Key used in AES
Correct Answer
C. Public key of the user
Explanation The responsibility of a certification authority for digital signatures is to authenticate the identity of the user. This is done by verifying the user's public key, which is a crucial component of the digital signature process. The public key is used to encrypt the digital signature, ensuring that it can only be decrypted by the corresponding private key held by the user. Therefore, the certification authority plays a vital role in ensuring the integrity and security of digital signatures by verifying and authenticating the user's public key.
Rate this question:
14.
For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset.
Correct Answer Ticket
Explanation In a client-server authentication, the client requests a ticket from the Key Distribution Center (KDC) in order to gain access to a specific asset. This ticket serves as a form of authorization and allows the client to prove its identity to the server. The KDC generates this ticket based on the client's credentials and the requested asset, ensuring that only authorized clients can access the asset.
Rate this question:
15.
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
A.
Confidentiality
B.
Integrity
C.
Authentication
D.
All
Correct Answer
C. Authentication
Explanation Authentication is the correct answer because it refers to the process of verifying the identity of a sender or a user. When a message is authenticated, it ensures that the receiver can trust that the message is indeed coming from the intended sender and not from someone pretending to be them. This helps in preventing impersonation or fraudulent activities.
Rate this question:
16.
A digital certificate system
A.
Uses third-party CAs to validate a user's identity.
B.
Uses digital signatures to validate a user's identity.
C.
Uses tokens to validate a user's identity.
D.
Are used primarily by individuals for personal correspondence.
Correct Answer
A. Uses third-party CAs to validate a user's identity.
Explanation A digital certificate system uses third-party CAs (Certificate Authorities) to validate a user's identity. These CAs are trusted entities that issue digital certificates, which are used to verify the authenticity and integrity of the user's identity. By relying on third-party CAs, the system ensures that the validation process is reliable and secure. Digital signatures and tokens are also used in some authentication systems, but in this case, the correct answer specifically mentions the use of third-party CAs.
Rate this question:
17.
In case of public key cryptography, X adds a digital signature K to message M, encrypts < M, K >, and sends it to Y, where it is decrypted. Choose the correct sequences of keys is used for the operations?
A.
Encryption: X’s private key followed by Y’s private key; Decryption: X’s public key followed by Y’s public key
B.
Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed by Y’s private key
C.
Encryption: X’s public key followed by Y’s private key; Decryption: Y’s public key followed by X’s private key
D.
Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key
Correct Answer
D. Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key
Explanation The correct answer is Encryption: X's private key followed by Y's public key; Decryption: Y's private key followed by X's public key. In public key cryptography, the sender (X) uses their private key to encrypt the message and the recipient's (Y) public key to decrypt it. This ensures that only the intended recipient can decrypt and read the message, as they are the only ones with the corresponding private key.
Rate this question:
18.
How many keys are required for two people to communicate via a cipher?
A.
Two key for symmetric ciphers, two keys for asymmetric ciphers
B.
One key for symmetric ciphers and asymmetric ciphers
C.
One key for symmetric ciphers, two keys for asymmetric ciphers
D.
Two key for symmetric ciphers, one keys for asymmetric ciphers
Correct Answer
C. One key for symmetric cipHers, two keys for asymmetric cipHers
Explanation Symmetric ciphers use the same key for both encryption and decryption, so only one key is needed for two people to communicate using a symmetric cipher. On the other hand, asymmetric ciphers use a pair of keys, one for encryption and another for decryption. Therefore, two keys are required for two people to communicate via an asymmetric cipher.
Rate this question:
19.
What will be the plain text corresponding to ciphered text “rmw ” if an affine cipher is used with key values as a=5, b=10?
A.
Csk
B.
Kkr
C.
Srt
D.
Msd
Correct Answer
C. Srt
Explanation The plain text corresponding to the ciphered text "rmw" can be found by using the formula P = (a^-1 * (C - b)) mod 26, where P is the plain text, a is the key value for a, b is the key value for b, C is the ciphered text, and mod 26 is used to wrap around the alphabet. In this case, a = 5 and b = 10. By substituting these values into the formula and calculating, the plain text "srt" is obtained.
Rate this question:
20.
In computer network security, a __________ is a device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Correct Answer firewall, Firewall
Explanation A firewall is a critical component in computer network security that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet. Firewalls can be hardware devices, software applications, or a combination of both, designed to prevent unauthorized access, cyberattacks, and other security threats by filtering traffic and blocking potentially harmful data.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.