You are on page 1of 1

19. In Message Confidentiality, the transmitted message must make sense to only intended .

a) Sender b) Receiver
c) Translator d) None
20. Use Caesar’s Cipher to decipher the following
HQFUBSWHG WHAW
a) ABANDONED LOCK b) ENCRYPTED TEXT
c) ABANDONED TEXT d) ENCRYPTED LOCK
21. Caesar Cipher is an example of
a) Poly-alphabetic Cipher b) Mono-alphabetic Cipher
c) Multi-alphabetic Cipher d) Bi-alphabetic Cipher
22. On Encrypting “cryptography” using Vignere Cipher System using the keyword “LUCKY” we get
cipher text
a) nlazeiibljji b) nlazeiibljii
c) olaaeiibljki d) mlaaeiibljki
Explanation: Cipher text:= Ci = Pi + ki mod m (mod 26).
23. Which of the following is difficult to detect?
a) Passive Attack b) Active Attack
24. The DES algorithm has a key length of
a) 128 Bits b) 32 Bits
c) 64 Bits d) 16 Bits
25. When a hash function is used to provide message authentication, the hash function value is referred to
as
a) Message Field b) Message Digest
c) Message Score d) Message Leap
26. Which one of the following is not an application hash functions?
a) One-way password file b) Virus Detection
c) Intrusion detection d) Key wrapping
27. Modification in IP packet with fake IP address will be called as _______
a) DDos b) Sniffing
c) Phishing d) Spoofing

You might also like