Security And Cryptography Quiz: Test!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Baidulla.madi
B
Baidulla.madi
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,225
| Attempts: 2,225 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. In cryptography, original message, before being transformed, is called

Explanation

In cryptography, the original message that is yet to be encrypted or transformed is referred to as the plain text. This term is used to distinguish the unencrypted message from the encrypted or transformed version. It is the message in its original form before any encryption or cryptographic operations are applied to it.

Submit
Please wait...
About This Quiz
Security And Cryptography Quiz: Test! - Quiz

This Security and Cryptography Quiz assesses knowledge in digital signatures, DES, and symmetric-key cryptography. It tests understanding of cryptographic keys and their roles in ensuring data security and... see moreauthenticity, making it ideal for learners in computer security. see less

2. DSS stands for:

Explanation

DSS stands for Digital Signature Standard. This is a cryptographic algorithm that is used to generate and verify digital signatures. Digital signatures are used to ensure the authenticity, integrity, and non-repudiation of electronic documents. The DSS algorithm uses a combination of public and private keys to create a unique digital signature for each document. This standard is widely used in various industries and applications to secure electronic transactions and communications.

Submit
3. An encryption algorithm transforms plaintext into

Explanation

An encryption algorithm is designed to convert plaintext into cipher text. This process involves the use of mathematical operations and a secret key to scramble the original message, making it unreadable to anyone who does not possess the key. The resulting cipher text can only be decrypted back into the original plaintext using the correct key. Therefore, the correct answer is "Cipher text."

Submit
4. One commonly used public-key cryptography method is the ______ algorithm.

Explanation

RSA is a commonly used public-key cryptography method. It stands for Rivest-Shamir-Adleman, named after the three inventors of the algorithm. RSA is widely used for secure communication, digital signatures, and encryption. It is based on the mathematical problem of factoring large composite numbers, making it difficult to break the encryption without the private key. RSA has been widely adopted and is considered secure for most applications.

Submit
5. Ciphers of today are called round ciphers because they involve

Explanation

Ciphers of today are called round ciphers because they involve multiple rounds. This means that the encryption process is repeated multiple times, with each round adding an additional layer of complexity to the cipher. By using multiple rounds, the cipher becomes more secure and resistant to attacks. Each round typically includes a combination of substitution, permutation, and other cryptographic operations to ensure the confidentiality and integrity of the data being encrypted. Overall, the use of multiple rounds enhances the security of modern ciphers.

Submit
6. Cryptography ensures:

Explanation

Cryptography ensures the confidentiality of data by encrypting it, making it unreadable to unauthorized users. It also ensures the authentication of data by verifying the identity of the sender and receiver, preventing any tampering or unauthorized access. Additionally, cryptography ensures the integrity of data by detecting any alterations or modifications made to the data during transmission. Therefore, the correct answer is "All of the above" as cryptography encompasses all these aspects to protect data.

Submit
7. AES stands for:

Explanation

AES stands for Advanced Encryption Standard. It is a widely used encryption algorithm that is used to secure sensitive data. It was developed by the National Institute of Standards and Technology (NIST) and is considered to be one of the most secure encryption standards available. AES uses a symmetric key algorithm, meaning the same key is used for both encryption and decryption. It is used in various applications such as securing communication over the internet, protecting sensitive information in databases, and securing data stored on devices.

Submit
8. SHA means:

Explanation

The correct answer is "Secure Hash Algorithm." SHA stands for Secure Hash Algorithm, which is a cryptographic hash function used to generate unique hash values for data. It is widely used in various security applications, such as digital signatures, password storage, and data integrity verification.

Submit
9. A hash function guarantees integrity of a message. It guarantees that message has not be

Explanation

A hash function guarantees the integrity of a message by generating a unique hash value for a given message. This hash value acts as a digital fingerprint for the message, ensuring that any changes made to the message will result in a different hash value. Therefore, if the hash value of a message is different from the original hash value, it indicates that the message has been changed in some way.

Submit
10. How many rounds of processing uses DES?

Explanation

DES (Data Encryption Standard) is a symmetric encryption algorithm that uses a Feistel network structure. In each round of processing, DES performs several operations, including permutation, substitution, and XOR operations. Specifically, DES consists of 16 rounds of processing. During each round, the algorithm applies a different subkey derived from the original encryption key. This process increases the security and complexity of the encryption. Therefore, the correct answer is 16.

Submit
11. RSA involves very large _____ numbers?

Explanation

RSA (Rivest-Shamir-Adleman) is a widely used encryption algorithm that relies on the difficulty of factoring large composite numbers. In RSA, two large prime numbers are used to generate the public and private keys. The security of RSA is based on the assumption that factoring large composite numbers into their prime factors is computationally infeasible. Therefore, the correct answer is "Prime" because RSA involves very large prime numbers.

Submit
12. The field which deals with _____ called cryptography.

Explanation

Cryptography is the field that deals with encryption techniques and secure systems. It involves the study and implementation of techniques to secure information and communications from unauthorized access or alteration. Encryption techniques are used to convert plaintext into ciphertext, making it unreadable without the proper decryption key. Secure systems, on the other hand, refer to the various mechanisms and protocols used to protect sensitive data and ensure secure communication. This includes authentication, access control, firewalls, intrusion detection systems, and other security measures.

Submit
13. In a(n) ________ cipher, the same key is used by both the sender and receiver

Explanation

In a symmetric-key cipher, the same key is used by both the sender and receiver to encrypt and decrypt the message. This means that both parties have access to the same key, allowing for efficient and secure communication. Unlike asymmetric-key cryptography, which uses different keys for encryption and decryption, symmetric-key cryptography is faster and more suitable for situations where both parties need to have access to the same key. The RSA algorithm, on the other hand, is a specific asymmetric-key algorithm used for encryption and digital signatures. Therefore, the correct answer is symmetric-key.

Submit
14. In cryptography

Explanation

The correct answer is "Information is transmitted from sender to receiver" because cryptography is the practice of securing communication by converting information into a format that is unreadable to unauthorized individuals. This implies that there is indeed information being transmitted between the sender and receiver, but it is done in a way that ensures its confidentiality and integrity.

Submit
15. In asymmetric encryption

Explanation

In asymmetric encryption, different keys are used for encryption and decryption. This means that there are two separate keys: a public key for encryption and a private key for decryption. The public key is used to encrypt the data, while the private key is kept secret and used to decrypt the data. This approach provides a higher level of security because even if the public key is intercepted, it cannot be used to decrypt the data without the corresponding private key.

Submit
16. Cryptography can provide:

Explanation

Cryptography is a powerful tool that can provide various security features. Entity authentication ensures that the communicating parties can verify each other's identities, preventing unauthorized access. Nonrepudiation of messages ensures that the sender cannot deny sending a message, providing accountability. Confidentiality ensures that the information exchanged between parties remains private and cannot be accessed by unauthorized individuals. Therefore, cryptography can indeed provide all of these security features.

Submit
17. RSA stands for

Explanation

RSA stands for Rivest, Shamir, Adleman. This is the correct answer because RSA is a public-key encryption algorithm that was developed by Ron Rivest, Adi Shamir, and Leonard Adleman in 1977. The algorithm is widely used for secure communication and data encryption.

Submit
18. The total number of rounds in DES algorithm.

Explanation

The DES algorithm, which stands for Data Encryption Standard, consists of 16 rounds. Each round involves several operations, including permutation, substitution, and key mixing, to encrypt the input data. These rounds ensure a high level of security and complexity in the encryption process. Therefore, the correct answer is 16.

Submit
19. The sender "signs" a message as:

Explanation

A digital signature is a cryptographic technique used to verify the authenticity and integrity of a message or document. It involves the use of a private key to encrypt the message, which can only be decrypted using the corresponding public key. This ensures that the message has not been tampered with during transmission and can be traced back to the sender. An artificial signature refers to a signature created by a computer program, while an encrypted signature is not a commonly used term in the context of message signing. Therefore, the correct answer is Digital Signature.

Submit
20. In symmetric-key cryptography, the key used by sender and receiver is

Explanation

In symmetric-key cryptography, the key used by the sender and receiver is "shared." This means that both parties have access to the same key, which is used for both encryption and decryption of the message. By sharing the key, the sender can encrypt the message using the key, and the receiver can decrypt it using the same key. This ensures that only the intended recipient, who possesses the key, can decrypt and access the message.

Submit
21. DES has an initial and final permutation block and _________ rounds.

Explanation

The correct answer is 16. DES (Data Encryption Standard) has an initial and final permutation block and a total of 16 rounds. During each round, a specific set of operations is performed on the input data to encrypt or decrypt it. These rounds increase the security and complexity of the encryption algorithm, making it more resistant to attacks.

Submit
22. Keys used in cryptography are:

Explanation

Keys used in cryptography include a secret key, a private key, and a public key. A secret key is used in symmetric encryption algorithms where the same key is used for both encryption and decryption. A private key is used in asymmetric encryption algorithms where a different key is used for encryption and decryption. A public key is used in asymmetric encryption algorithms where the public key is used for encryption and the corresponding private key is used for decryption. Therefore, all three types of keys are used in cryptography.

Submit
23. The method of hiding the secret is called…

Explanation

Cryptography is the method of hiding a secret through the use of encryption techniques. It involves converting plain text into cipher text, making it unreadable to anyone who does not have the decryption key. This process ensures the confidentiality and integrity of information, protecting it from unauthorized access or tampering. Cryptography is widely used in various fields, such as secure communication, data protection, and financial transactions.

Submit
24. Cryptography algorithms (ciphers) are divided into:

Explanation

Cryptography algorithms (ciphers) are divided into two groups. This means that there are two distinct categories or classifications for these algorithms. This division allows for easier organization and understanding of the different types of ciphers. It also suggests that there are different characteristics or properties that differentiate the algorithms within each group.

Submit
25. Diffie-Hellman key exchange is vulnerable to:

Explanation

The Diffie-Hellman key exchange is vulnerable to a man-in-the-middle attack. In this type of attack, a malicious third party intercepts the communication between the two parties who are trying to establish a secure key. The attacker then impersonates each party to establish separate secure connections with them. This allows the attacker to intercept and modify the exchanged keys, compromising the security of the communication.

Submit
26. Public key cryptosystem provides confidentiality:

Explanation

Public key cryptosystem provides confidentiality because it uses a pair of keys - a public key and a private key. The public key is used to encrypt the data, while the private key is used to decrypt it. Only the intended recipient with the private key can decrypt and access the confidential information. This ensures that the data remains secure and confidential during transmission and storage.

Submit
27. What is the purpose of access control list?

Explanation

Access control lists (ACLs) are used to determine who is allowed to access certain resources or data. By implementing ACLs, organizations can prevent unauthorized access to sensitive information, protecting it from potential breaches or misuse. ACLs enforce security policies by specifying which users or groups have permission to access specific resources, ensuring that only authorized individuals can view or modify the data. Emphasizing encryption is not the primary purpose of ACLs, and they are not a key distribution center.

Submit
28. Secure hash algorithm(SHA) developed by:

Explanation

The correct answer is National Institute of Standards and Technology or NSA. The NSA is responsible for the development of the Secure Hash Algorithm (SHA). SHA is a widely used cryptographic hash function that is used to ensure data integrity and security. It is designed to produce a unique and fixed-size hash value from input data of any size. The development of SHA by the NSA demonstrates their expertise and focus on cryptographic algorithms and security standards.

Submit
29. Public key cryptosystem provides authentication:

Explanation

Public key cryptosystem provides authentication by using a pair of keys, a public key and a private key. The public key is freely available to anyone, while the private key is kept secret by the owner. When someone wants to authenticate themselves, they can use their private key to encrypt a message, and anyone with the corresponding public key can decrypt it. This process verifies the identity of the sender, as only the owner of the private key could have encrypted the message. Therefore, public key cryptosystem provides authentication.

Submit
30. Authentication is:

Explanation

Authentication refers to the process of verifying the identity of a user. It involves confirming that the user is who they claim to be before granting them access to a system, application, or data. This can be done through various means such as passwords, biometrics, security tokens, or two-factor authentication. By verifying the user's identification, authentication ensures that only authorized individuals are granted access, enhancing security and protecting against unauthorized access or data breaches.

Submit
31. Message privacy means that sender and receiver expect:

Explanation

Message privacy refers to the protection of the content of a message from unauthorized access or disclosure. It ensures that only the intended recipient can access and understand the message. Confidentiality is an essential aspect of message privacy, as it ensures that the information remains private and cannot be accessed or understood by unauthorized parties. It involves encryption and other security measures to prevent unauthorized access to the message content. Therefore, the expectation of confidentiality is crucial for maintaining the privacy of messages between sender and receiver.

Submit
32. In symmetric cryptography, which of the following MUST be true.

Explanation

In symmetric cryptography, the same key is used for both encryption and decryption. This is because symmetric encryption algorithms use a single key to both scramble and unscramble the data. The key is shared between the sender and the receiver, allowing them to encrypt and decrypt the message using the same key. This ensures that the message remains secure and can only be accessed by those who possess the key.

Submit
33. Operation in AES is based on

Explanation

The operation in AES is based on a combination of both substitution and permutation. Substitution involves replacing each byte of the input with another byte based on a specific substitution table. Permutation involves rearranging the positions of the bytes in the input. This combination of substitution and permutation provides a high level of security and makes AES resistant to various cryptographic attacks.

Submit
34. Which of the following method provides a one-time session key for two parties?

Explanation

Diffie-Hellman is a method that allows two parties to establish a shared secret key over an insecure channel. It provides a one-time session key for the two parties by allowing them to independently generate public and private keys, exchange public keys, and then compute a shared secret key using their own private keys and the other party's public key. This shared secret key can then be used for secure communication between the two parties. RSA, DES, and AES are encryption algorithms but do not specifically provide a one-time session key for two parties like Diffie-Hellman does.

Submit
35. The process to discover plaintext or key is known as

Explanation

Cryptanalysis refers to the process of analyzing and deciphering encrypted messages or codes without having access to the key or the original plaintext. It involves studying the patterns and weaknesses in the encryption algorithm to uncover the meaning behind the encrypted data. This process is often used by individuals or organizations to break encryption systems and gain unauthorized access to sensitive information. Cryptanalysis plays a crucial role in the field of cybersecurity and is used both for defensive purposes, such as identifying vulnerabilities in encryption systems, as well as offensive purposes, such as cracking encrypted messages for intelligence gathering.

Submit
36. To check integrity of a message or document, receiver creates the :

Explanation

To check the integrity of a message or document, the receiver creates a hash. A hash is a fixed-length string of characters that is generated by applying a mathematical algorithm to the content of the message or document. This hash serves as a unique identifier for the content, allowing the receiver to compare it with the original hash provided by the sender. If the hashes match, it ensures that the message or document has not been tampered with during transmission.

Submit
37. DES algorithm uses total ______ subkeys.

Explanation

The DES algorithm uses a total of 16 subkeys. These subkeys are derived from the original encryption key through a process called key scheduling. Each subkey is used in a different round of the DES algorithm to perform the encryption or decryption operation. The use of multiple subkeys enhances the security of the algorithm by introducing complexity and making it more difficult for attackers to break the encryption.

Submit
38. Message _____ means that the data must arrive at the receiver exactly as sent.

Explanation

Integrity in the context of data transmission means that the data must arrive at the receiver exactly as it was sent, without any unauthorized changes or alterations. This ensures that the data has not been tampered with during transmission and maintains its accuracy and completeness. Confidentiality refers to the protection of data from unauthorized access, authentication refers to verifying the identity of a user or system, and none of the above does not accurately describe the concept of data arriving unchanged.

Submit
39. Digital Signatures are:

Explanation

Digital signatures are a cryptographic technique used to verify the authenticity of the sender of a message or document. They provide proof that the sender is who they claim to be and that the message has not been tampered with during transmission. By using a private key to encrypt the message, the sender creates a unique digital signature that can only be decrypted with their public key. This allows the receiver to verify the sender's identity and ensure the integrity of the message. Therefore, the correct answer is "Proof of authenticity of the sender."

Submit
40. _____________ is the science and art of transforming messages to make them secure and immune to attacks

Explanation

Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves the use of mathematical algorithms and techniques to encrypt and decrypt information, ensuring that only authorized individuals can access and understand the message. Cryptography plays a crucial role in maintaining the confidentiality, integrity, and authenticity of data in various fields such as computer security, communication systems, and financial transactions.

Submit
41. What does multilevel security mean?

Explanation

Multilevel security refers to the classification of information based on its level of importance and the permission of access granted to users with different security clearances. This means that information is categorized into different levels of sensitivity, and users are granted access based on their clearance level, ensuring that only authorized individuals can access information that is appropriate for their level of clearance.

Submit
42. What is Confidentiality?

Explanation

Confidentiality refers to the preservation of authorized restrictions on information access and disclosure, which includes measures to protect personal privacy and proprietary information. This means that only those who are authorized should have access to certain information, and it should not be disclosed to unauthorized individuals. This helps to maintain the privacy and security of personal and sensitive information, preventing it from falling into the wrong hands.

Submit
43. AES is

Explanation

AES stands for Advanced Encryption Standard, which is a widely used encryption algorithm. It is a symmetric key encryption algorithm, meaning that the same key is used for both the encryption and decryption processes. In symmetric key encryption, the sender and receiver both use the same key to encrypt and decrypt the data, ensuring confidentiality and data integrity. This makes AES an efficient and secure encryption method for protecting sensitive information.

Submit
44. Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and

Explanation

The given question is incomplete as it does not provide any specific information or options to choose from. Therefore, an explanation cannot be generated.

Submit
45. The ________ method provides a one-time session key for two parties.

Explanation

The Diffie-Hellman method is a key exchange protocol that allows two parties to establish a shared secret over an insecure communication channel. It provides a one-time session key for the two parties, which can be used for secure communication. This method is widely used in cryptography to ensure secure communication between two entities without the need for pre-shared keys.

Submit
46. What is Availability?

Explanation

Availability refers to the protection and assurance of timely and reliable access to information. This means that the information system is accessible and usable whenever needed, without any disruptions or delays. It involves measures to prevent unauthorized access, information modification, or destruction, and ensures that the information remains authentic and nonrepudiable. By ensuring availability, organizations can maintain the functionality and usability of their information systems, allowing users to access and utilize information as and when required.

Submit
47. The _______ is a number or a set of numbers on which the cipher operates.

Explanation

A key is a number or a set of numbers that is used in a cipher to perform the encryption or decryption process. It is essentially the input that determines how the cipher operates and transforms the plaintext into ciphertext or vice versa. The key acts as a parameter for the cipher algorithm, determining the specific steps and operations that are applied to the data. Without a key, the cipher would not be able to function correctly and would not be able to provide secure encryption or decryption of the data.

Submit
48. Which of the following is not property of hash functions?

Explanation

A hash function is a mathematical function that takes an input (or "message") and produces a fixed-size string of characters, known as the hash value or hash code. This hash code is typically much shorter than the input message. Therefore, the property of "long, unfixed output" contradicts the characteristics of a hash function. Hash functions are designed to have a fixed output size, regardless of the length of the input message.

Submit
49. The purpose of hash function is to

Explanation

A hash function is used to map data of arbitrary size to fixed-size values. This process can be thought of as “compressing” the message, as it takes a potentially large amount of data and reduces it to a much smaller, fixed size. The values returned by a hash function, known as hash values, hash codes, digests, or simply hashes, are usually used to index a fixed-size table called a hash table. It’s important to note that while a hash function does “compress” data in a sense, it’s not the same as data compression used for storage or transmission, where the goal is to reduce the size of data while preserving the ability to reconstruct the original data. Once data has been hashed, it cannot be reversed or decoded back to its original form.

Submit
50. DES uses a key generator to generate sixteen _______ round keys.

Explanation

DES (Data Encryption Standard) uses a key generator to generate sixteen 48-bit round keys. These round keys are derived from the original 64-bit key provided by the user. Each round key is used in the encryption process to modify the state of the data being encrypted. The 48-bit size of the round keys ensures that the encryption algorithm is strong and secure, providing a high level of protection for the data being encrypted.

Submit
51. What is Computer Security

Explanation

Computer security refers to the measures taken to protect an automated information system. These measures aim to achieve the objectives of maintaining the integrity, availability, and confidentiality of the resources within the information system. This includes safeguarding against unauthorized access and disclosure of information, protecting personal privacy and proprietary information, preventing improper modification or destruction of information, and ensuring reliable and timely access to and use of information.

Submit
52. DES is a(n) ________ method adopted by the U.S. government.

Explanation

The correct answer is "Symmetric - key". Symmetric-key encryption is a method where the same key is used for both encryption and decryption. It is adopted by the U.S. government because it is efficient and provides a high level of security. In symmetric-key encryption, the sender and receiver must both have the same key, which is kept secret. This method is commonly used for secure communication and data protection.

Submit
53. Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.

Explanation

Authentication is the correct answer because it ensures that the receiver can trust that the message is indeed coming from the intended sender and not from someone pretending to be the sender. Authentication is a security measure that verifies the identity of the sender, providing assurance that the message has not been tampered with or modified by an imposter.

Submit
54. What is Integrity?

Explanation

Integrity refers to the protection against improper information modification or destruction. It involves ensuring that information cannot be tampered with or destroyed in an unauthorized manner. Additionally, integrity also includes measures to ensure information nonrepudiation and authenticity, meaning that the information can be trusted and its origin or sender cannot be denied.

Submit
55. AES input data is

Explanation

The AES (Advanced Encryption Standard) input data refers to the size of the data blocks that can be encrypted or decrypted using the AES algorithm. In this case, the correct answer is 128 bit, which means that the AES algorithm can process data blocks of 128 bits in size. This is the most commonly used block size for AES and provides a good balance between security and efficiency.

Submit
56. Which of the following is not used for symmetric encryption?

Explanation

RSA is not used for symmetric encryption. RSA is an asymmetric encryption algorithm that uses two different keys, a public key for encryption and a private key for decryption. In contrast, symmetric encryption algorithms like DES, RC4, and SHA1 use the same key for both encryption and decryption. MD5, on the other hand, is a hashing algorithm and not used for encryption at all.

Submit
57. In AES, 192 bit key has:

Explanation

The AES encryption algorithm with a 192-bit key size has 12 rounds. Each round consists of several operations, including substitution, permutation, and mixing of the input data. The number of rounds determines the level of security provided by the algorithm. In AES, the key size directly affects the number of rounds required for encryption. With a 192-bit key, 12 rounds are needed to ensure a strong level of security for the encrypted data.

Submit
58. Asymmetric Keys:

Explanation

Asymmetric keys refer to a pair of related keys, a public key and a private key, which are used for performing complementary operations like encryption and decryption or signature verification. This means that the public key can be used to encrypt data or verify signatures, while the private key is used for decryption or signing. The use of two different keys with complementary functions adds an extra layer of security to cryptographic operations.

Submit
59. Public Key Certificate:

Explanation

A public key certificate is a digital document that is issued by a Certification Authority and is digitally signed with their private key. It binds the name of a subscriber to a public key and serves as proof that the subscriber has sole control and access to the corresponding private key. This ensures the authenticity and integrity of the public key and allows for secure communication and authentication in various applications.

Submit
60. In RSA:

Explanation

The correct answer is p,q – prime. In RSA encryption, the security relies on the difficulty of factoring large composite numbers into their prime factors. Therefore, both p and q need to be prime numbers in order to ensure the security of the encryption. If either p or q is not prime, it would make the encryption vulnerable to attacks.

Submit
61. The ________ cipher reorders the plaintext characters to create a ciphertext

Explanation

The transposition cipher is a type of encryption where the order of the plaintext characters is rearranged to create the ciphertext. It does not change the actual characters, but rather changes their positions. This type of cipher does not substitute or shift the characters, but instead focuses on rearranging them.

Submit
62. Authentication protocol:

Explanation

The given answer accurately describes the purpose of an authentication protocol. Authentication protocols are used to verify and confirm the identity of entities, such as users or devices, in a secure manner. These protocols rely on cryptographic algorithms to ensure that the identity being claimed is legitimate and not falsified. By using encryption and other security measures, authentication protocols protect against unauthorized access and impersonation.

Submit
63. ________ means to prove the identity of the entity that tries to access the system's resources.

Explanation

Entity authentication refers to the process of verifying the identity of the entity attempting to access a system's resources. This involves validating the credentials or attributes presented by the entity to ensure that it is who it claims to be. By successfully completing entity authentication, the system can trust that the entity is authorized to access the resources and can grant appropriate permissions. Message authentication, message confidentiality, and message integrity are related to ensuring the security and integrity of data during transmission, but they do not directly address the identification of the entity accessing the system.

Submit
64. How many levels are covered in multilevel security

Explanation

Multilevel security is a security model that allows different levels of access to information based on the user's clearance level. It typically consists of four levels: top secret, secret, confidential, and unclassified. Each level has its own set of restrictions and access controls. Therefore, the correct answer is 4.

Submit
65. A message is authentic and digitally signed if sent with:

Explanation

When a message is authentic and digitally signed, it means that the sender's identity is verified and the message has not been tampered with during transmission. In this case, the correct answer is "A message digest/hash encrypted with the sender’s private key." This is because the sender uses their private key to encrypt the message digest or hash of the message. The recipient can then use the sender's public key to decrypt the message digest and verify its authenticity. By using the private key for encryption, only the sender with the corresponding private key can create the digital signature, ensuring the integrity and authenticity of the message.

Submit
66. SHA-1 has a message digest of :

Explanation

SHA-1 is a cryptographic hash function that produces a fixed-size output of 160 bits. This means that regardless of the size of the input message, the SHA-1 algorithm will always generate a 160-bit message digest. The purpose of the message digest is to provide a unique representation of the input message, ensuring data integrity and allowing for efficient verification. The 160-bit size of the SHA-1 message digest provides a good balance between security and efficiency in many applications.

Submit
67. RSA was presented in

Explanation

RSA, which stands for Rivest-Shamir-Adleman, is a public-key encryption algorithm that was developed by Ron Rivest, Adi Shamir, and Leonard Adleman. It was first presented in 1977, making it the correct answer. RSA is widely used in various applications, including secure communication, digital signatures, and secure online transactions.

Submit
68. Symmetric encryption:

Explanation

Symmetric encryption is a cryptographic technique that is used to hide the contents of a block or stream of data, regardless of its size. It can be applied to conceal various types of information, such as messages, files, encryption keys, and passwords. This encryption method ensures that the data remains confidential and secure from unauthorized access. By using symmetric encryption, the data is transformed into an unreadable format, making it unintelligible to anyone without the proper decryption key. This ensures the privacy and integrity of the data being transmitted or stored.

Submit
69. No read up (read down) means

Explanation

This answer correctly states the principle of "no read up" (also known as "no read down") in information security. According to this principle, a subject (such as a user or a program) is only allowed to read data from an object (such as a file or a database) that has an equal or lower security level than the subject. This helps to prevent unauthorized access to sensitive information and maintain the confidentiality of data.

Submit
70. Which of the following refers requirement of digital signature?

Explanation

A digital signature is a cryptographic mechanism used to verify the authenticity and integrity of digital documents or messages. It is designed to ensure that the signature cannot be forged or tampered with. The requirement for a digital signature to be computationally infeasible to forge means that it should be extremely difficult, if not impossible, for an attacker to create a fake signature that appears valid. This ensures the reliability and trustworthiness of the digital signature system.

Submit
71. What is the encryption key size of DES

Explanation

The encryption key size of DES is 56-bit. DES (Data Encryption Standard) is a symmetric encryption algorithm that uses a 56-bit key to encrypt and decrypt data. The key size determines the strength of the encryption, with larger key sizes providing stronger security. In the case of DES, the 56-bit key size has been found to be vulnerable to brute-force attacks, leading to the development of more secure encryption algorithms with larger key sizes.

Submit
72. A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula to define the relationship between the input stream and the output stream..

Explanation

An S-box is a keyless substitution cipher with N inputs and M outputs that uses a formula to define the relationship between the input stream and the output stream. It is commonly used in symmetric key algorithms to provide confusion and non-linearity to the encryption process. The S-box takes a fixed-size input and produces a fixed-size output, typically by performing a series of substitutions based on a lookup table or mathematical formula. It is an essential component in many cryptographic systems to enhance the security and resistance against attacks.

Submit
73. Message digest is referred to:

Explanation

A message digest is a fixed-size numerical value that is generated by applying a hash function to a message. It is used to ensure the integrity and authenticity of the message by providing a unique identifier for the message. Unlike RSA, which is a public-key encryption algorithm, a message digest does not involve encryption or decryption. It is also different from a digital signature, which involves the use of a private key to sign a message. Therefore, the correct answer is "Hash function."

Submit
74. Difficulty of Diffie-Hellman algorithm depends on:

Explanation

The difficulty of the Diffie-Hellman algorithm depends on computing the discrete logarithm. This refers to the challenge of finding the exponent to which a given number must be raised to obtain another given number, within a specific mathematical group. The computational complexity of solving this problem is what makes the Diffie-Hellman algorithm secure, as it is believed to be a difficult task for an attacker to compute the discrete logarithm efficiently.

Submit
75. Heart of Data Encryption Standard (DES), is the

Explanation

The correct answer is DES function. The DES function is the core component of the Data Encryption Standard (DES) algorithm. It is responsible for performing the encryption and decryption operations on the input data. The DES function consists of several rounds of complex mathematical operations, including permutation, substitution, and exclusive OR (XOR) operations. These operations ensure the security and confidentiality of the data by transforming it into an encrypted form that can only be decrypted with the correct key.

Submit
76. Which of the following is an active attack? I. Release of message contents; II. Traffic analysis; III. Modify; IV. Denial of Service.

Explanation

An active attack refers to an attack where the attacker actively modifies or disrupts the communication. In this case, option III states "Modify," which indicates that it involves altering the message or data being transmitted. Option IV states "Denial of Service," which involves intentionally disrupting or disabling the normal functioning of a network or system. Both of these options involve active interference with the communication, making them active attacks. Therefore, the correct answer is III and IV.

Submit
77. Some operating systems (e.g. Windows) include deny or negative access rights. In this case, an access check procedure can terminate as soon as…

Explanation

When an operating system includes deny or negative access rights, it means that certain users or groups are explicitly denied access to certain resources. In the context of an access check procedure, when a negative or deny ACE (Access Control Entry) is found, it indicates that the requestor is denied access to the resource. Therefore, there is no need to continue traversing the rest of the ACL (Access Control List) as the access check procedure can terminate at this point. The presence of a deny ACE overrides any positive or grant access ACE that may be present in the ACL.

Submit
78. What is the size of round key for DES algorithm?

Explanation

The size of the round key for the DES algorithm is 48 bits. This is because DES uses a 56-bit key, but only 48 bits of the key are used in each round. The remaining 8 bits are used for parity checks. Therefore, the round key size is 48 bits.

Submit
79. What is the difference between stream cipher and one-time pad?

Explanation



The primary difference between a stream cipher and a one-time pad lies in the generation of the keystream used for encryption

.

Stream cipher uses a pseudo-random number stream: In a stream cipher, a pseudo-random number generator (PRNG) is used to create a keystream. This keystream is combined with the plaintext message, typically using the XOR operation, to generate the ciphertext. The security of a stream cipher relies on the quality of the PRNG, which is initialized with a secret key.



One-time pad uses a truly random number stream: A one-time pad (OTP) is a theoretically unbreakable encryption technique that uses a truly random keystream, also known as a pad. The pad is combined with the plaintext message using the XOR operation to generate the ciphertext. For the OTP to be truly secure, the pad must be at least as long as the plaintext, and it must be used only once. The security of the one-time pad relies on the true randomness of the pad and its single-use nature.



In summary, stream ciphers use pseudo-random numbers, while one-time pads use truly random numbers. Both are symmetric key encryption methods, and they share similarities in the encryption process. However, the one-time pad offers theoretical perfect secrecy when used correctly, whereas stream ciphers can be more practical and efficient in real-world applications.
Submit
80. The first published public-key algorithm

Explanation

Diffie-Hellman is considered the first published public-key algorithm because it was the first algorithm to introduce the concept of exchanging keys over a public channel without compromising security. It allows two parties to securely establish a shared secret key over an insecure communication channel. This algorithm is based on the mathematical problem of discrete logarithm, and it laid the foundation for modern public-key cryptography.

Submit
81. The purpose of Diffie-Hellman algorithm:

Explanation

The purpose of the Diffie-Hellman algorithm is to enable two users to securely exchange a key that can then be used for symmetric encryption of messages. This algorithm allows the users to establish a shared secret key over an insecure channel, without actually transmitting the key itself. This shared key can then be used for symmetric encryption, where both parties can encrypt and decrypt messages using the same key. This ensures that only the intended recipients can read the encrypted messages, providing confidentiality and security in the communication.

Submit
82. No write down(write up) means

Explanation

This answer correctly states the principle of the "no write down" rule. According to this rule, a subject (user or process) can only write (modify or update) an object (file or data) that has an equal or higher security level than the subject. This rule is a fundamental principle in security models like the Bell-LaPadula model, which aims to prevent unauthorized information flow and maintain the confidentiality and integrity of data. By enforcing this rule, the system ensures that information is not downgraded or compromised by allowing writes only to objects with equal or higher security levels.

Submit
83. Public Keys Cryptography Algorithm:

Explanation

Public Key Cryptography is a cryptographic algorithm that uses two related keys, a public key and a private key. These keys have the property that deriving the private key from the public key is computationally infeasible. This means that even if the public key is known, it is extremely difficult to determine the corresponding private key. This property ensures the security of the encryption and decryption process, as well as the verification of digital signatures. Public Key Cryptography is widely used in various applications, such as secure communication, digital signatures, and secure online transactions.

Submit
84. In symmetric key cryptography, key(s) used for encryption and decryption is/are

Explanation

In symmetric key cryptography, the key used for encryption and decryption is the same key. This means that both the sender and the receiver use the same secret key to both encrypt and decrypt the message. This is in contrast to asymmetric key cryptography, where there are separate public and private keys for encryption and decryption.

Submit
85. Number of submissions for SHA-3 algorithm:

Explanation

The correct answer is 64. This suggests that there were 64 submissions for the SHA-3 algorithm.

Submit
86. Biometrics represents:

Explanation

Biometrics represents all of the above options: something you know, something you have, and something you are. Biometrics is a method of authentication that uses unique physical or behavioral characteristics to verify a person's identity. It can include knowledge-based factors like passwords or PINs (something you know), possession-based factors like smart cards or tokens (something you have), and intrinsic factors like fingerprints, iris patterns, or facial features (something you are). By combining multiple factors, biometrics provides a more secure and reliable form of identification.

Submit
87. Public Key Infrastructure:

Explanation

The correct answer explains that Public Key Infrastructure (PKI) is a comprehensive system consisting of policies, processes, server platforms, software, and workstations. Its main purpose is to administer certificates and public-private key pairs. This includes the ability to issue, maintain, and revoke public key certificates. PKI ensures the secure exchange of information by utilizing two related keys, a public key and a private key, which are used for encryption, decryption, signature verification, and other complementary operations.

Submit
88. AES is

Explanation

AES is six times faster than 3DES because AES (Advanced Encryption Standard) is a more efficient and faster encryption algorithm compared to 3DES (Triple Data Encryption Standard). AES uses a block size of 128 bits, while 3DES uses a block size of 64 bits. Additionally, AES employs a substitution-permutation network, which allows for faster encryption and decryption processes. The increased speed of AES makes it six times faster than 3DES in terms of encryption and decryption operations.

Submit
89. A digital signature needs a:

Explanation

A private key is used to create the digital signature, and a public key is used to verify the signature. The private key is kept secret and should only be known to the owner, while the public key is shared with others who need to verify the digital signatures created with the corresponding private key. There is no shared key involved in the process of creating or verifying digital signatures.

Submit
90. Public key cryptosystem provides availability:

Explanation

Public key cryptosystem provides confidentiality and integrity, but not availability. Availability refers to the ability of a system to be accessible and usable when needed. Public key cryptosystems do not directly address availability concerns, as they primarily focus on ensuring secure communication and data protection. Availability is typically addressed through other means such as redundancy, backups, and disaster recovery plans. Therefore, the given answer is false.

Submit
91. What is the difference between stream cipher and one-time pad?

Explanation

The correct answer is that one-time pad uses a genuine random number stream. This means that the numbers used in a one-time pad are truly random and not generated by any algorithm or process. In contrast, a stream cipher may use a random number stream, but it does not necessarily have to be genuinely random. It could be generated by a pseudo-random number generator, which means that it is not truly random but appears random based on a specific algorithm.

Submit
92. Define a subject of Access Control List.

Explanation

The correct answer is "An active entity requesting for resource access." An access control list is a method used to control access to a resource or system. It consists of a list of permissions or rules that determine what actions an active entity, such as a user or process, can perform on a passive entity, such as a file or network resource. The active entity requests access to the resource, and the access control list determines whether the request should be granted or denied based on the permissions specified in the list.

Submit
93. A file is created by a certain user, who becomes its owner. The owner can choose to provide access to this file to other users. If file data confidentiality is desired, the owner should control who has…

Explanation

If file data confidentiality is desired, the owner should control who has read access to the file. By only allowing certain users to read the file, the owner can ensure that the file's contents remain confidential and not accessible to unauthorized individuals.

Submit
94. Public-key encryption has ___ ingredients:

Explanation

Public-key encryption has 6 ingredients.

Submit
95. Asymmetric encryption:

Explanation

Asymmetric encryption is used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures. This type of encryption involves the use of a pair of keys, a public key for encryption and a private key for decryption. The public key can be freely shared, allowing anyone to encrypt data, while the private key is kept secret and used to decrypt the data. By using asymmetric encryption, the integrity and authenticity of the small blocks of data, such as encryption keys and hash function values, can be ensured in digital signatures.

Submit
96. A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream.

Explanation

A P-box is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream. It rearranges the bits of the input stream according to the predefined table, providing a permutation of the input bits to produce the output stream. This permutation helps to enhance the confusion and diffusion properties of the cipher, making it more secure against cryptographic attacks. The other options mentioned (S-box, T-box, and SP-boxes) are not specifically related to keyless transposition ciphers.

Submit
97. Alice goes to a movie theater and purchases a ticket for her favorite movie. She is allowed access to the movie because she has the ticket. The ticket is more like a…

Explanation

The ticket in this scenario functions as a capability, as it grants Alice access to the movie theater and allows her to watch her favorite movie. A capability is a token or object that provides the holder with certain privileges or permissions. In this case, the ticket acts as a proof of purchase and grants Alice the capability to enter the theater and enjoy the movie.

Submit
98. Diffusion

Explanation

Diffusion in encryption refers to the property where each plaintext bit should have an impact on as many ciphertext bits as possible. This ensures that any change in the plaintext will cause significant changes in the resulting ciphertext, making it difficult for attackers to analyze and break the encryption. By spreading the influence of each plaintext bit across multiple ciphertext bits, diffusion enhances the overall security and complexity of the encryption algorithm.

Submit
99. Define an object of Access Control List.

Explanation

An object of Access Control List refers to a passive entity that is the target of the protection. This means that the Access Control List is used to determine the level of access that the passive entity has to certain resources. It acts as a list or set of permissions that specifies what actions can be performed on the target entity. The Access Control List helps in controlling and managing the security of the passive entity by allowing or denying access based on the defined permissions.

Submit
100. The Caesar cipher is a _______cipher that has a key of 3

Explanation



The Caesar cipher is a substitution cipher that operates by shifting the alphabet by a fixed number of positions, known as the key. In this case, the key is 3, meaning each letter is shifted three positions to encrypt or decrypt messages.
Submit
View My Results

Quiz Review Timeline (Updated): Jan 19, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 19, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • May 17, 2018
    Quiz Created by
    Baidulla.madi
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
In cryptography, original message, before being transformed, is called
DSS stands for:
An encryption algorithm transforms plaintext into
One commonly used public-key cryptography method is the ______...
Ciphers of today are called round ciphers because they involve
Cryptography ensures:
AES stands for:
SHA means:
A hash function guarantees integrity of a message. It guarantees that...
How many rounds of processing uses DES?
RSA involves very large _____ numbers?
The field which deals with _____ called cryptography.
In a(n) ________ cipher, the same key is used by both the sender and...
In cryptography
In asymmetric encryption
Cryptography can provide:
RSA stands for
The total number of rounds in DES algorithm.
The sender "signs" a message as:
In symmetric-key cryptography, the key used by sender and receiver is
DES has an initial and final permutation block and _________ rounds.
Keys used in cryptography are:
The method of hiding the secret is called…
Cryptography algorithms (ciphers) are divided into:
Diffie-Hellman key exchange is vulnerable to:
Public key cryptosystem provides confidentiality:
What is the purpose of access control list?
Secure hash algorithm(SHA) developed by:
Public key cryptosystem provides authentication:
Authentication is:
Message privacy means that sender and receiver expect:
In symmetric cryptography, which of the following MUST be true.
Operation in AES is based on
Which of the following method provides a one-time session key for two...
The process to discover plaintext or key is known as
To check integrity of a message or document, receiver creates the :
DES algorithm uses total ______ subkeys.
Message _____ means that the data must arrive at the receiver exactly...
Digital Signatures are:
_____________ is the science and art of transforming messages to make...
What does multilevel security mean?
What is Confidentiality?
AES is
Advanced Encryption Standard (AES), has three different configurations...
The ________ method provides a one-time session key for two parties.
What is Availability?
The _______ is a number or a set of numbers on which the cipher...
Which of the following is not property of hash functions?
The purpose of hash function is to
DES uses a key generator to generate sixteen _______ round keys.
What is Computer Security
DES is a(n) ________ method adopted by the U.S. government.
Message _______ means that the receiver is ensured that the message is...
What is Integrity?
AES input data is
Which of the following is not used for symmetric encryption?
In AES, 192 bit key has:
Asymmetric Keys:
Public Key Certificate:
In RSA:
The ________ cipher reorders the plaintext characters to create a...
Authentication protocol:
________ means to prove the identity of the entity that tries to...
How many levels are covered in multilevel security
A message is authentic and digitally signed if sent with:
SHA-1 has a message digest of :
RSA was presented in
Symmetric encryption:
No read up (read down) means
Which of the following refers requirement of digital signature?
What is the encryption key size of DES
A(n) ______ is a keyless substitution cipher with N inputs and M...
Message digest is referred to:
Difficulty of Diffie-Hellman algorithm depends on:
Heart of Data Encryption Standard (DES), is the
Which of the following is an active attack? I. Release of message...
Some operating systems (e.g. Windows) include deny or negative access...
What is the size of round key for DES algorithm?
What is the difference between stream cipher and one-time pad?
The first published public-key algorithm
The purpose of Diffie-Hellman algorithm:
No write down(write up) means
Public Keys Cryptography Algorithm:
In symmetric key cryptography, key(s) used for encryption and...
Number of submissions for SHA-3 algorithm:
Biometrics represents:
Public Key Infrastructure:
AES is
A digital signature needs a:
Public key cryptosystem provides availability:
What is the difference between stream cipher and one-time pad?
Define a subject of Access Control List.
A file is created by a certain user, who becomes its owner. The owner...
Public-key encryption has ___ ingredients:
Asymmetric encryption:
A(n) _______is a keyless transposition cipher with N inputs and M...
Alice goes to a movie theater and purchases a ticket for her favorite...
Diffusion
Define an object of Access Control List.
The Caesar cipher is a _______cipher that has a key of 3
Alert!

Advertisement