Network Security

Question 1
Avalanche effect in cryptography refers
A
Large changes in cipher text when the keyword is changed minimally
B
Large changes in cipher text when the plain text is changed
C
Large Impact of keyword change to length of the cipher text
D
None of the above
ISRO CSE 2020   Computer Network
Question 2
In a columnar transportation cipher, the plain text is "the tomato is a plant in the night shade family", keyword is "TOMATO". The cipher text is
A
"TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX"
B
"TINESAX / EOAHTFX / MAIIAIX / HTLTHEY / TAPNGDL / OSTNHMX"
C
"TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / OSTNHMX / TAPNGDL"
D
"EOAHTFX / TINESAX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX"
ISRO CSE 2020   Computer Network
Question 3
In an RSA cryptosystem, the value of the public modulus parameter n is 3007. If it is also is known that \phi(n)=2880, where \phi() denotes Euler's Totient Function, then the prime factors of n which is greater than 50 is _________ .
A
71
B
83
C
97
D
91
GATE CSE 2019   Computer Network
Question 4
Which one of the following algorithm is not used in asymmetric key cryptography?
A
RSA Algorithm
B
Gillie-Hellman Algorithm
C
Electronic Code Book Algorithm
D
None of the above
ISRO CSE 2018   Computer Network
Question 5
What is one advantage of setting up a DMZ (Demilitarized Zone) with two firewalls?
A
You can control where traffic goes in the three networks
B
You can do statefull packet filtering
C
You can do load balancing
D
Improve network performance
ISRO CSE 2018   Computer Network
Question 6
Avalanche effect in cryptography
A
Is desirable property of cryptographic algorithm
B
Is undesirable property of cryptographic algorithm
C
Has no effect on encryption algorithm
D
None of the above
ISRO CSE 2018   Computer Network
Question 7
In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encrypton)
WELCOME TO NETWORK SECURITY!
A
WMEKREETSILTWETCOOCYONRU!
B
EETSICOOCYWMEKRONRU!LTWET
C
LTWETONRU!WMEKRCOOCYEETSI
D
ONRU!COOCYLTWETEETSIWMEKR
ISRO CSE 2018   Computer Network
Question 8
Pretty Good Privacy (PGP) is used in:
A
Browser security
B
FTP security
C
Email security
D
None of the above
ISRO CSE 2017   Computer Network
Question 9
MD5 is a widely used hash function for producing hash value of
A
64 bits
B
128 bits
C
512 bits
D
1024 bits
ISRO CSE 2017   Computer Network
Question 10
In a RSA cryptosystem a participant A uses two prime numbers p=13 and q=17 to generate her public and private keys. If the public key of A is 35. Then the private key of A is __________.
A
13
B
19
C
23
D
11
GATE CSE 2017 SET-1   Computer Network
There are 10 questions to complete.

Leave a Comment

Like this FREE website? Please share it among all your friends and join the campaign of FREE Education to ALL.