CNS - Quiz - S2 - SS2024-25

CNS - Quiz - S2 - SS2024-25

University

15 Qs

quiz-placeholder

Similar activities

Firewall Basic

Firewall Basic

University

10 Qs

email protocols

email protocols

University

20 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

INTERNET

INTERNET

KG - University

17 Qs

Telecommunications

Telecommunications

University

20 Qs

ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

University

20 Qs

Node.js

Node.js

University

10 Qs

GEMATMW - Cryptography

GEMATMW - Cryptography

University - Professional Development

16 Qs

CNS - Quiz - S2 - SS2024-25

CNS - Quiz - S2 - SS2024-25

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

ARUL A

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

On Encrypting “cryptography” using Vigenere Cipher System using the keyword “LUCKY” we get cipher text

nlazeiibljji

nlazeiibljii

okaaeiibljli

mlaaeiibljki

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose from among the following cipher systems, from best to the worst, with respect to ease of decryption using frequency analysis.

Random Polyalphabetic, Plaintext, Playfair

Random Polyalphabetic, Playfair, Vignere

Random Polyalphabetic, Vignere, Playfair, Plaintext

Random Monoalphabetic, Playfair, Vernam

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cryptography, the order of the letters in a message is rearranged by

a.Transposition ciphers

b.Substitution ciphers

c.Both (a) and (b)

d.Quadratic ciphers

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the DES algorithm the round key is ____bit and the Round Input is ____bits.

64,32

48, 32

56, 24

32, 32

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the expanded key size of AES-192?

44 words

60 words

52 words

36 words

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________ensures that sensitive information are accessed only by an authorized person and kept away from those not authorized to possess them.

Availability

Cryptography

Integrity

Confidentiality

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption and decryption provide secrecy, or confidentiality, but not

Authentication

Integrity

Privacy

All the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?