# Network Security

 Question 1
Avalanche effect in cryptography refers
 A Large changes in cipher text when the keyword is changed minimally B Large changes in cipher text when the plain text is changed C Large Impact of keyword change to length of the cipher text D None of the above
ISRO CSE 2020   Computer Network
Question 1 Explanation:
 Question 2
In a columnar transportation cipher, the plain text is "the tomato is a plant in the night shade family", keyword is "TOMATO". The cipher text is
 A "TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX" B "TINESAX / EOAHTFX / MAIIAIX / HTLTHEY / TAPNGDL / OSTNHMX" C "TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / OSTNHMX / TAPNGDL" D "EOAHTFX / TINESAX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX"
ISRO CSE 2020   Computer Network
Question 2 Explanation:
 Question 3
In an RSA cryptosystem, the value of the public modulus parameter n is 3007. If it is also is known that $\phi(n)=2880$, where $\phi()$ denotes Euler's Totient Function, then the prime factors of n which is greater than 50 is _________ .
 A 71 B 83 C 97 D 91
GATE CSE 2019   Computer Network
Question 3 Explanation:
 Question 4
Which one of the following algorithm is not used in asymmetric key cryptography?
 A RSA Algorithm B Gillie-Hellman Algorithm C Electronic Code Book Algorithm D None of the above
ISRO CSE 2018   Computer Network
Question 4 Explanation:
 Question 5
What is one advantage of setting up a DMZ (Demilitarized Zone) with two firewalls?
 A You can control where traffic goes in the three networks B You can do statefull packet filtering C You can do load balancing D Improve network performance
ISRO CSE 2018   Computer Network
Question 5 Explanation:
 Question 6
Avalanche effect in cryptography
 A Is desirable property of cryptographic algorithm B Is undesirable property of cryptographic algorithm C Has no effect on encryption algorithm D None of the above
ISRO CSE 2018   Computer Network
Question 6 Explanation:
 Question 7
In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encrypton)
WELCOME TO NETWORK SECURITY!
 A WMEKREETSILTWETCOOCYONRU! B EETSICOOCYWMEKRONRU!LTWET C LTWETONRU!WMEKRCOOCYEETSI D ONRU!COOCYLTWETEETSIWMEKR
ISRO CSE 2018   Computer Network
Question 7 Explanation:
 Question 8
Pretty Good Privacy (PGP) is used in:
 A Browser security B FTP security C Email security D None of the above
ISRO CSE 2017   Computer Network
Question 8 Explanation:
 Question 9
MD5 is a widely used hash function for producing hash value of
 A 64 bits B 128 bits C 512 bits D 1024 bits
ISRO CSE 2017   Computer Network
Question 9 Explanation:
 Question 10
In a RSA cryptosystem a participant A uses two prime numbers p=13 and q=17 to generate her public and private keys. If the public key of A is 35. Then the private key of A is __________.
 A 13 B 19 C 23 D 11
GATE CSE 2017 SET-1   Computer Network
Question 10 Explanation:
There are 10 questions to complete.