Cryptography and Network Security - Unit 1

Cryptography and Network Security - Unit 1

University

15 Qs

quiz-placeholder

Similar activities

Profesi, Kewirausahaan, peluang usaha bidang ketenagalistrikan

Profesi, Kewirausahaan, peluang usaha bidang ketenagalistrikan

10th Grade - University

20 Qs

Saber Pro Test - Industrial Engineering (9th Semester)

Saber Pro Test - Industrial Engineering (9th Semester)

University

10 Qs

Examen entrada de Ingeniería el software

Examen entrada de Ingeniería el software

University

10 Qs

Quizotronics Quiz

Quizotronics Quiz

University

20 Qs

SET A

SET A

University

10 Qs

Logo Thon Quiz Competition

Logo Thon Quiz Competition

University

20 Qs

Web Development with MERN

Web Development with MERN

University

20 Qs

SEGURIDAD INFORMATICA

SEGURIDAD INFORMATICA

University

15 Qs

Cryptography and Network Security - Unit 1

Cryptography and Network Security - Unit 1

Assessment

Quiz

Engineering

University

Medium

Created by

Saranya Susi

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a security service as per OSI Security Architecture?


a) Data Confidentiality

b) Authentication

c) Integrity

d) Protocol Control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the OSI security architecture primarily define?

a) Physical Layer Security

b) Security services and mechanisms

c) Encryption algorithms only

d) Data transmission methods

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cipher replaces one character with another?

a) Transposition cipher

b) Substitution cipher

c) Stream cipher

d) Block cipher

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In classical encryption, the Caesar Cipher shifts characters by how many places by default?

a) 2

b) 3

c) 4

d) 5

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary principle of confusion in encryption?

a) Ensuring that ciphertext and plaintext have no correlation

b) Rearranging plaintext to create ciphertext

c) Splitting data into blocks

d) Hiding the encryption algorithm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technique involves rearranging plaintext characters to form ciphertext?

a) Substitution


b) Transposition

c) Permutation

d) Key Scheduling

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Data Encryption Standard (DES) uses a Sub key size of how many bits?

a) 56

b) 64

c) 128

d) 192

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?