Professional Documents
Culture Documents
Roll-27 - Test1 On Cryptography
Roll-27 - Test1 On Cryptography
Roll no. - 27
a) access control
b) availability
c) authentication
d) nonrepudiation
a) interception
b) fabrication
c) modification
d) interruption
a) passive
b) active
a) masquerade
b) alteration
c) denial of service
d) replay
5. Denial of Service(DoS) attacks are caused by _______.
a) authentication
b) alteration
c) fabrication
d) replay attack
a) does not
b) does
d) may
7. A ______ replicates itself by creating its own copies in order to bring the network to a halt.
a) virus
b) worm
c) Trojan horse
d) bomb
a) substitution cipher
b) transposition cipher
c) both a) & b)
a) interception
b) fabrication
c) modification
d) interruption
12. If we want to ensure the principle of ________, the contents of a message must not be
modified while it is in transit.
a) confidentiality
b) data integrity
c) authentication
d) nonrepudiation
a) easier
b) the same
c) difficult
d) easier or same
a) keys
b) transpositions
c) codes
d) mono alphabetic substitution rules
15. The mechanism of writing text as rows and reading as columns is called
a) Vernam cipher
b) Caesar cipher