You are on page 1of 4

Tamaghno Chaudhuri CSE 4th Year 8th Semester

Roll no. - 27

Test-1 on Cryptography & Network Security


1. The principle of ______ ensures that the sender of a message can’t later claim that the
message was never sent.

a) access control

b) availability

c) authentication

d) nonrepudiation

2. The ______ attack is related to confidentiality.

a) interception

b) fabrication

c) modification

d) interruption

3. In ________ attacks, there is no modification to message content.

a) passive

b) active

c) both of the above

d) none of the above

4. Interruption attacks are also called ________ attacks.

a) masquerade

b) alteration

c) denial of service

d) replay
5. Denial of Service(DoS) attacks are caused by _______.

a) authentication

b) alteration

c) fabrication

d) replay attack

6. A worm ______ modify a program.

a) does not

b) does

c) may or may not

d) may

7. A ______ replicates itself by creating its own copies in order to bring the network to a halt.

a) virus

b) worm

c) Trojan horse

d) bomb

8. In substitution cipher, the following happens.

a) Characters are replaced by other characters.

b) Rows are replaced by columns.

c) Columns are replaced by rows.

d) None of the above

9. Transposition cipher involves

a) replacement of blocks of text with other blocks

b) replacement of characters of text with other characters

c) some permutation on the input text to produce cipher text

d) strictly row to column replacement.


10. Vernam cipher is an example of

a) substitution cipher

b) transposition cipher

c) both a) & b)

d) none of the above

11. The _______ attack is related to data integrity.

a) interception

b) fabrication

c) modification

d) interruption

12. If we want to ensure the principle of ________, the contents of a message must not be
modified while it is in transit.

a) confidentiality

b) data integrity

c) authentication

d) nonrepudiation

13. Homophonic substitution cipher is ________ to break as compared to monoalphabetic


cipher.

a) easier

b) the same

c) difficult

d) easier or same

14. A polyalphabetic cipher uses many _____.

a) keys

b) transpositions

c) codes
d) mono alphabetic substitution rules

15. The mechanism of writing text as rows and reading as columns is called

a) Vernam cipher

b) Caesar cipher

c) Simple columnar transposition technique

d) Homophonic substitution cipher

You might also like