Search Header Logo

CNSLAB QUIZ-1

Authored by Asheesh Tiwari

Computers

University

Used 3+ times

CNSLAB QUIZ-1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If, no matter how much ciphertext is decrypted, it is impossible to uniquely determine the associated plaintext, then the encryption technique is said to be totally secure. Then above statement is for:

Unconditionally secure cipher systems.

Conditionally secure cipher systems.

Half secure systems.

Conditional cipher systems.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a high-tech espionage thriller, two spies sit in a secluded cafe, each holding a sealed envelope. Knowing that there is confusion regarding the relationship between the ciphertext and the plaintext, they exchange nervous glances. As they cautiously pass the envelopes, they wonder if they can trust each other in this deadly game of secrets and deception. From the given option, choose whether the connection is obscured by confusion.

True.

Very True

Incorrect

Partial true.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Inside a top-secret government cybersecurity facility, a team of experts assembles around a massive supercomputer. They're conducting a critical assessment of a newly developed cryptographic algorithm. One of the researchers, standing at a whiteboard covered in equations and diagrams, raises an important question: "Which of the following factors causes the cryptographic algorithm to run more slowly?" The room falls silent as they begin to explore the intricate details of algorithm performance and efficiency, knowing that their findings could have significant implications for national security.

1) An escalation in the total number of rounds

2) A smaller overall size for the blocks

3) Reduce the Size of the Keys

4) An Increase in the Generation of Subkeys

1 and 3

2 and 3

3 and 4

2 and 4

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a cryptography workshop attended by eager students, a professor stands at the front of the room, chalk in hand, ready to delve into the intricacies of affine ciphers. With a chalkboard filled with mathematical equations and matrices, the professor asks the class, "How many different affine cipher transformations are feasible using three by three blocks?" As the students furrow their brows and start calculating, the room is abuzz with the excitement of unraveling the secrets of encryption.

1344

840

1024

168

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which letters appear the most frequently in the written form of the English language?

e,a

e,o

e,t

e,i

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose one of the following cipher systems based on how easy it is to decode the data using frequency analysis, starting with the best and working your way down to the worst.

Random Polyalphabetic, Plaintext, Playfair

Random Polyalphabetic, Playfair, Vignere

Random Polyalphabetic, Vignere, Playfair, Plaintext

Random Polyalphabetic, Plaintext, Beaufort, Playfair

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Estimates of the number of computations needed to decipher a password consisting of six characters drawn from an alphabet with 26 letters is:

  308915776

11881376

456976

8031810176

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?