Cryptography and Network Security - Unit 1

Cryptography and Network Security - Unit 1

University

15 Qs

quiz-placeholder

Similar activities

Logo Thon Quiz Competition

Logo Thon Quiz Competition

University

20 Qs

Combinational Logic Circuits

Combinational Logic Circuits

University

20 Qs

Deep Learning

Deep Learning

University

10 Qs

Exploring Cryptography Algorithms

Exploring Cryptography Algorithms

University

12 Qs

capa física

capa física

University

16 Qs

Quizotronics Quiz

Quizotronics Quiz

University

20 Qs

Logo Thon Quiz Competition

Logo Thon Quiz Competition

University

20 Qs

SET A

SET A

University

10 Qs

Cryptography and Network Security - Unit 1

Cryptography and Network Security - Unit 1

Assessment

Quiz

Engineering

University

Medium

Created by

Saranya Susi

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a security service as per OSI Security Architecture?


a) Data Confidentiality

b) Authentication

c) Integrity

d) Protocol Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the OSI security architecture primarily define?

a) Physical Layer Security

b) Security services and mechanisms

c) Encryption algorithms only

d) Data transmission methods

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cipher replaces one character with another?

a) Transposition cipher

b) Substitution cipher

c) Stream cipher

d) Block cipher

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In classical encryption, the Caesar Cipher shifts characters by how many places by default?

a) 2

b) 3

c) 4

d) 5

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary principle of confusion in encryption?

a) Ensuring that ciphertext and plaintext have no correlation

b) Rearranging plaintext to create ciphertext

c) Splitting data into blocks

d) Hiding the encryption algorithm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique involves rearranging plaintext characters to form ciphertext?

a) Substitution


b) Transposition

c) Permutation

d) Key Scheduling

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Data Encryption Standard (DES) uses a Sub key size of how many bits?

a) 56

b) 64

c) 128

d) 192

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?