CNSLAB QUIZ-1

CNSLAB QUIZ-1

University

9 Qs

quiz-placeholder

Similar activities

Assignment6

Assignment6

University

10 Qs

Chapter 6 (Fundamentals of Cybersecurity

Chapter 6 (Fundamentals of Cybersecurity

University

10 Qs

Quiz-1 Classical Encryption Techniques

Quiz-1 Classical Encryption Techniques

University

14 Qs

TAC3121-Quiz 3

TAC3121-Quiz 3

University

10 Qs

Chapter 10: Encryption Techniques

Chapter 10: Encryption Techniques

University

10 Qs

Kriptografi

Kriptografi

University

10 Qs

IAS 2 Quiz 1 Part 2

IAS 2 Quiz 1 Part 2

University

10 Qs

TAC3121-Quiz 5

TAC3121-Quiz 5

University

10 Qs

CNSLAB QUIZ-1

CNSLAB QUIZ-1

Assessment

Quiz

Computers

University

Hard

Created by

Asheesh Tiwari

Used 3+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If, no matter how much ciphertext is decrypted, it is impossible to uniquely determine the associated plaintext, then the encryption technique is said to be totally secure. Then above statement is for:

Unconditionally secure cipher systems.

Conditionally secure cipher systems.

Half secure systems.

Conditional cipher systems.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a high-tech espionage thriller, two spies sit in a secluded cafe, each holding a sealed envelope. Knowing that there is confusion regarding the relationship between the ciphertext and the plaintext, they exchange nervous glances. As they cautiously pass the envelopes, they wonder if they can trust each other in this deadly game of secrets and deception. From the given option, choose whether the connection is obscured by confusion.

True.

Very True

Incorrect

Partial true.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Inside a top-secret government cybersecurity facility, a team of experts assembles around a massive supercomputer. They're conducting a critical assessment of a newly developed cryptographic algorithm. One of the researchers, standing at a whiteboard covered in equations and diagrams, raises an important question: "Which of the following factors causes the cryptographic algorithm to run more slowly?" The room falls silent as they begin to explore the intricate details of algorithm performance and efficiency, knowing that their findings could have significant implications for national security.

1) An escalation in the total number of rounds

2) A smaller overall size for the blocks

3) Reduce the Size of the Keys

4) An Increase in the Generation of Subkeys

1 and 3

2 and 3

3 and 4

2 and 4

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a cryptography workshop attended by eager students, a professor stands at the front of the room, chalk in hand, ready to delve into the intricacies of affine ciphers. With a chalkboard filled with mathematical equations and matrices, the professor asks the class, "How many different affine cipher transformations are feasible using three by three blocks?" As the students furrow their brows and start calculating, the room is abuzz with the excitement of unraveling the secrets of encryption.

1344

840

1024

168

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which letters appear the most frequently in the written form of the English language?

e,a

e,o

e,t

e,i

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose one of the following cipher systems based on how easy it is to decode the data using frequency analysis, starting with the best and working your way down to the worst.

Random Polyalphabetic, Plaintext, Playfair

Random Polyalphabetic, Playfair, Vignere

Random Polyalphabetic, Vignere, Playfair, Plaintext

Random Polyalphabetic, Plaintext, Beaufort, Playfair

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Estimates of the number of computations needed to decipher a password consisting of six characters drawn from an alphabet with 26 letters is:

  308915776

11881376

456976

8031810176

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a secure military command center, a stern officer addresses a room full of intelligence operatives. Pointing at a classified document displayed on a screen, the officer states, "When a message is '_________,' it signifies the information must be received unaltered from its original form."

authentication

confidentiality

integrity-protected

none of these

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice wants to send a confidential message to Bob over an unsecured public network. She's concerned about the message being intercepted and read by unauthorized parties. Which cryptographic technique should Alice use to ensure the confidentiality of her message?

Symmetric Encryption

Asymmetric Encryption

Hashing

Digital Signatures