
Networking and Cryptography Quiz
Authored by Viswathika K
Other
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The work done by UDP is/are: (A) Congestion control (B) Flow control (C) Retransmission (D) Segments transmission Choose the correct answer from the options given below :
(A) and (D) Only
(C) Only
(D) Only
(B) and (C) Only
Answer explanation
UDP (User Datagram Protocol) is a simple, connectionless protocol. It does not perform congestion control, flow control, or retransmission. Its primary function is to transmit data segments, with minimal overhead for faster data transfer. This makes UDP suitable for applications that prioritize speed over reliability, such as video streaming or online gaming.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hash functions are used to produce the message digests which are then encrypted with a private key to get:
Public key
Digital signature
Cipher text
Data Encryption Standard
Answer explanation
Hash functions generate a fixed-size message digest from a larger input message. When this digest is encrypted with a private key, it forms a digital signature. This digital signature ensures the authenticity and integrity of the message, as it can be verified using the sender's public key but cannot be forged without the private key.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A message is encrypted using public key cryptography to send a message from sender to receiver. Which one of the following statements is true?
Receiver decrypts using his own public key
Receiver decrypts using sender's public key
Sender encrypts using his own public key
Sender encrypts using receiver's public key
Answer explanation
In public key cryptography, the sender encrypts the message using the receiver's public key, ensuring that only the receiver, who has the corresponding private key, can decrypt and read the message. This ensures the confidentiality of the message.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not needed by an encryption algorithm used in Cryptography? A) KEY B) Message C) Ciphertext D) User details
(C) only
(D) only
(B), (C) and (D) only
(C) and (D) only
Answer explanation
An encryption algorithm requires a key (A) and a message (B) as inputs to perform encryption. Ciphertext (C) is the output of the encryption process, not an input, so it is not directly needed for the algorithm to work.User details (D) are not needed by the encryption algorithm. The encryption algorithm works based on the key and message alone. User details are unrelated to the encryption process itself.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Decrypt the message "WTAAD" using the Caesar Cipher with key=15.
LIPPS
HELLO
OLLEH
DAATW
Answer explanation
In the Caesar Cipher, each letter is shifted by a certain number of positions in the alphabet. Here, the key is 15, meaning each letter in the ciphertext is shifted back by 15 positions.
W= 23-15 = 8 (h)
T = 20-15 = 5 (e)
A = 1-15= -14 + 26 = 12 (1) {when get negative number then add 26 to wrap arround}
A = 1-15 = -14 + 26 = 12 (1)
D = 4-15 = -11 + 26 = 15 (0)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The ability to inject packets into the internet with a false source address is known as:
Man-in-the-Middle attack
IP phishing
IP sniffing
IP Spoofing
Answer explanation
IP spoofing is a technique where an attacker manipulates the source address of IP packets to appear as if they are coming from a trusted source. This is often used in network attacks to bypass security filters or to masquerade as another device.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A fully connected network topology is a topology in which there is a direct link between all pairs of nodes. Given a fully connected network with n nodes, the number of direct links as a function of n can be expressed as:
n(n+1)/2
(n+1)/2
n/n/2n/2
n(n−1)/2
Answer explanation
In a fully connected network, each node is directly connected to every other node. For n nodes, the number of direct links needed is calculated as n(n−1)/2. This is because each of the n nodes can connect to (n−1) other nodes, but each connection is counted twice (once from each node), so we divide by 2.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
CI knowledge game
Quiz
•
Professional Development
20 questions
todo sobre games
Quiz
•
Professional Development
25 questions
Try Out 1 Bahasa Indonesia SMK
Quiz
•
Professional Development
20 questions
PSM Training
Quiz
•
Professional Development
20 questions
แบบทดสอบ Security
Quiz
•
Professional Development
20 questions
Project Resource Management I (20)
Quiz
•
Professional Development
20 questions
Purification Techniques
Quiz
•
Professional Development
20 questions
HINDI QUIZ ON OL
Quiz
•
12th Grade - Professi...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Other
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
12 questions
Unit 5: Puerto Rico W1
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
15 questions
Balance Equations Hangers
Quiz
•
Professional Development
31 questions
Servsafe Food Manager Practice Test 2021- Part 1
Quiz
•
9th Grade - Professio...