Computer Hardware and Networking MCQ Quiz Hub

Information and Network Security Set 2

Choose a topic to test your knowledge and improve your Computer Hardware and Networking skills

The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.





✅ Correct Answer: 3

People will normally think it as a normal/regular file and your secret message will pass on without any _____________





✅ Correct Answer: 3

By using ______________ you can diminish the chance of data leakage.





✅ Correct Answer: 1

Which mode of operation has the worst “error propagation” among the following?





✅ Correct Answer: 1

Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution?





✅ Correct Answer: 3

Which mode requires the implementation of only the encryption algorithm?





✅ Correct Answer: 2

Which of the following modes of operation does not involve feedback?





✅ Correct Answer: 1

Which of the following is a natural candidates for stream ciphers?





✅ Correct Answer: 1

Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?





✅ Correct Answer: 4

Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen asthe AES algorithm?





✅ Correct Answer: 4

How many rounds does the AES-192 perform?





✅ Correct Answer: 2

What is the expanded key size of AES-192?





✅ Correct Answer: 3

The 4×4 byte matrices in the AES algorithm are called_____





✅ Correct Answer: 4

In AES the 4×4 bytes matrix key is transformed into a keys of size __________.





✅ Correct Answer: 4

For the AES-128 algorithm there are __________ similar rounds and _________ roundis different.





✅ Correct Answer: 1

There is an addition of round key before the start of the AES round algorithms.





✅ Correct Answer: 1

How many computation rounds does the simplified AES consists of?





✅ Correct Answer: 2

On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?





✅ Correct Answer: 2

What is the block size in the Simplified AES algorithm?





✅ Correct Answer: 3

. What is the block size in the Simplified AES algorithm?





✅ Correct Answer: 3

What is the key size in the S-AES algorithm?





✅ Correct Answer: 3

Which of the following is a faulty S-AES step function?





✅ Correct Answer: 3

How many step function do Round 1 and 2 each have in S-AES?





✅ Correct Answer: 4

The inverse transformation matrix times the forward transformation matrix equals the identity matrix.





✅ Correct Answer: 1

How many round keys are generated in the AES algorithm?





✅ Correct Answer: 2

DES follows_________.





✅ Correct Answer: 2

The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.





✅ Correct Answer: 1

The DES algorithm has a key length of ______.





✅ Correct Answer: 3

In the DES algorithm the round key is __________ bit and the Round Input is ____________bits.





✅ Correct Answer: 1

In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via____________.





✅ Correct Answer: 4

The Initial Permutation table/matrix is of size _____.





✅ Correct Answer: 2

The number of unique substitution boxes in DES after the 48 bit XOR operationare___.





✅ Correct Answer: 2

What is the number of possible 3 x 3 affine cipher transformations?





✅ Correct Answer: 3

The S-Box is used to provide confusion, as it is dependent on the unknown key.





✅ Correct Answer: 1

For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88and thus find the CT.





✅ Correct Answer: 2

For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Ciphermessage=11 and thus find the plain text.





✅ Correct Answer: 4

In an RSA system the public key of a given user is e = 31, n = 3599. What is the privatekey of this user?





✅ Correct Answer: 4

Compute private key (d, p, q) given public key (e=23, n=233 ´ 241=56,153).





✅ Correct Answer: 2

RSA is also a stream cipher like Merkel-Hellman.





✅ Correct Answer: 1

In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?





✅ Correct Answer: 2

In RSA, Ф(n) = _______ in terms of p and q.





✅ Correct Answer: 2

For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 andfind the cipher text.





✅ Correct Answer: 4

For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher message=80 and thus find the plain text.





✅ Correct Answer: 1

Perform encryption on the following PT using RSA and find the CT. p = 3; q = 11; M= 5.





✅ Correct Answer: 3

Perform encryption on the following PT using RSA and find the CT. p = 5; q = 11; M= 9.





✅ Correct Answer: 2

Perform encryption on the following PT using RSA and find the CT. p = 7; q = 11; M= 8.





✅ Correct Answer: 4

Perform encryption on the following PT using RSA and find the CT. p = 11; q = 13;M = 7.





✅ Correct Answer: 3

n = 35; e = 5; C = 10. What is the plaintext (use RSA)?





✅ Correct Answer: 3