117dy - Information Security PDF
117dy - Information Security PDF
1
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
IV B. Tech. I Sem., I Mid-Term Examinations, September -2017
INFORMATION SECURITY
Objective Exam
Name: ______________________________ Hall Ticket No. A
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 10.
2. An act to convert plaintext into ciphertext in order to preserve confidentiality of data is called?
[ ]
A) Encryption B) Decryption C) Hash D) Message authentication
5. A stream cipher takes a key K of n bits in length and stretches it into along ___________.[ ]
A) Keystream. B) Search key. C) Key length. D) Public key.
6. If both sender and receiver use the same key the system is referred to as _________ encryption.
[ ]
A) symmetric B) public key C) asymmetric D) two-key
7. The Advanced Encryption Standard (AES), has three different configurations with respect to the number
of rounds and [ ]
A) Data Size B)Round Size C)Key Size D)Encryption Size
Cont..2
Code No: 117DY :2: Set No. 1
11. __________________________ Assures that private or confidential information is not made available
or disclosed to unauthorized individuals.
12. __________________________ Assures that systems work promptly and service is not denied to
authorized users.
13. The property of being genuine and being able to be verified and trusted is called
______________________.
14. Any action that compromises the security of information owned by an organization is called
_________________.
15. _______________ attacks are in the nature of eavesdropping on, or monitoring of, transmissions.
16. In _________________ attack, the attacker tries every possible key on a piece of cipher text until an
intelligible translation into plaintext is obtained.
17. A __________cipher is one that encrypts a digital data stream one bit or one byte at a time.
18. In ___________________ method, each plaintext element or group of elements is uniquely replaced by
a corresponding cipher text element or group of elements.
19. ________________ function that maps a message of any length into a fixed length value, which serves
as the authenticator.
20. A function of the message and a secret key that produces a fixed-length value that serves as the
authenticator is _______________________________.
-oOo-
Code No: 117DY Set No. 2
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
IV B. Tech. I Sem., I Mid-Term Examinations, September -2017
INFORMATION SECURITY
Objective Exam
Name: ______________________________ Hall Ticket No. A
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 10.
2. A stream cipher takes a key K of n bits in length and stretches it into along ___________.[ ]
A) Keystream. B) Search key. C) Key length. D) Public key.
3. If both sender and receiver use the same key the system is referred to as _________ encryption.
[ ]
A) symmetric B) public key C) asymmetric D) two-key
4. The Advanced Encryption Standard (AES), has three different configurations with respect to the number
of rounds and [ ]
A) Data Size B)Round Size C)Key Size D)Encryption Size
9. An act to convert plaintext into ciphertext in order to preserve confidentiality of data is called?
[ ]
A) Encryption B) Decryption C) Hash D) Message authentication
Cont..2
Code No: 117DY :2: Set No. 2
11. Any action that compromises the security of information owned by an organization is called
_________________.
12. _______________ attacks are in the nature of eavesdropping on, or monitoring of, transmissions.
13. In _________________ attack, the attacker tries every possible key on a piece of cipher text until an
intelligible translation into plaintext is obtained.
14. A __________cipher is one that encrypts a digital data stream one bit or one byte at a time.
15. In ___________________ method, each plaintext element or group of elements is uniquely replaced by
a corresponding cipher text element or group of elements.
16. ________________ function that maps a message of any length into a fixed length value, which serves
as the authenticator.
17. A function of the message and a secret key that produces a fixed-length value that serves as the
authenticator is _______________________________.
18. __________________________ Assures that private or confidential information is not made available
or disclosed to unauthorized individuals.
19. __________________________ Assures that systems work promptly and service is not denied to
authorized users.
20. The property of being genuine and being able to be verified and trusted is called
______________________.
-oOo-
Code No: 117DY Set No. 3
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
IV B. Tech. I Sem., I Mid-Term Examinations, September -2017
INFORMATION SECURITY
Objective Exam
Name: ______________________________ Hall Ticket No. A
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 10.
1. If both sender and receiver use the same key the system is referred to as _________ encryption.
[ ]
A) symmetric B) public key C) asymmetric D) two-key
2. The Advanced Encryption Standard (AES), has three different configurations with respect to the number
of rounds and [ ]
A) Data Size B)Round Size C)Key Size D)Encryption Size
7. An act to convert plaintext into ciphertext in order to preserve confidentiality of data is called?
[ ]
A) Encryption B) Decryption C) Hash D) Message authentication
10. A stream cipher takes a key K of n bits in length and stretches it into along ___________.[ ]
A) Keystream. B) Search key. C) Key length. D) Public key.
Cont..2
Code No: 117DY :2: Set No. 3
11. In _________________ attack, the attacker tries every possible key on a piece of cipher text until an
intelligible translation into plaintext is obtained.
12. A __________cipher is one that encrypts a digital data stream one bit or one byte at a time.
13. In ___________________ method, each plaintext element or group of elements is uniquely replaced by
a corresponding cipher text element or group of elements.
14. ________________ function that maps a message of any length into a fixed length value, which serves
as the authenticator.
15. A function of the message and a secret key that produces a fixed-length value that serves as the
authenticator is _______________________________.
16. __________________________ Assures that private or confidential information is not made available
or disclosed to unauthorized individuals.
17. __________________________ Assures that systems work promptly and service is not denied to
authorized users.
18. The property of being genuine and being able to be verified and trusted is called
______________________.
19. Any action that compromises the security of information owned by an organization is called
_________________.
20. _______________ attacks are in the nature of eavesdropping on, or monitoring of, transmissions.
-oOo-
Code No: 117DY Set No. 4
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
IV B. Tech. I Sem., I Mid-Term Examinations, September -2017
INFORMATION SECURITY
Objective Exam
Name: ______________________________ Hall Ticket No. A
Answer All Questions. All Questions Carry Equal Marks. Time: 20 Min. Marks: 10.
5. An act to convert plaintext into ciphertext in order to preserve confidentiality of data is called?
[ ]
A) Encryption B) Decryption C) Hash D) Message authentication
8. A stream cipher takes a key K of n bits in length and stretches it into along ___________.[ ]
A) Keystream. B) Search key. C) Key length. D) Public key.
9. If both sender and receiver use the same key the system is referred to as _________ encryption.
[ ]
A) symmetric B) public key C) asymmetric D) two-key
10. The Advanced Encryption Standard (AES), has three different configurations with respect to the number
of rounds and [ ]
A) Data Size B)Round Size C)Key Size D)Encryption Size
Cont..2
Code No: 117DY :2: Set No. 4
11. In ___________________ method, each plaintext element or group of elements is uniquely replaced by
a corresponding cipher text element or group of elements.
12. ________________ function that maps a message of any length into a fixed length value, which serves
as the authenticator.
13. A function of the message and a secret key that produces a fixed-length value that serves as the
authenticator is _______________________________.
14. __________________________ Assures that private or confidential information is not made available
or disclosed to unauthorized individuals.
15. __________________________ Assures that systems work promptly and service is not denied to
authorized users.
16. The property of being genuine and being able to be verified and trusted is called
______________________.
17. Any action that compromises the security of information owned by an organization is called
_________________.
18. _______________ attacks are in the nature of eavesdropping on, or monitoring of, transmissions.
19. In _________________ attack, the attacker tries every possible key on a piece of cipher text until an
intelligible translation into plaintext is obtained.
20. A __________cipher is one that encrypts a digital data stream one bit or one byte at a time.
-oOo-