Search Header Logo

CNS-Quiz

Authored by Dr. CSE

Computers

University

Used 1+ times

CNS-Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Encryption Strength is based on

  1. Strength of algorithm

  1. Length of key

  1. Secrecy of key

  1. All of the above

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In cryptography, the order of letters in a message is rearranged by

  1. Transpositional ciphers

  1. Substitution ciphers

  1. Both (A) and (B)

  1. Quadratic ciphers

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

In public key encryption, if A wants to send an encrypted message

  1. A encrypts message using B’s public key

  1. A encrypts message using his private key

  1. A encrypts message using B’s private key

  1. A encrypts message using his public key

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is data encryption standard (DES)?

  1. Bit cipher

  1. Stream cipher


Block cipher

  1. Byte cipher

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the 4 operations are false for each round in the AES algorithm
i) Substitute Bytes
ii) Shift Columns
iii) Mix Rows
iv) XOR Round Key

i) only

ii) iii) and iv)

ii) and iii)

only iv)

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

gcd( 18,300)

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

73 mod 19

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?