CSS MCQ
CSS MCQ
CSS MCQ
In this scenario,
one or more of the following security violations can take place.
(II) A third party attacker can launch a birthday attack to replace m with a fraudulent message.
(A) (I) and (II) only
(B) (I) only
(C) (II) only
(D) (II) and (III) only
Answer : (B)
2) In a RSA cryptosystem, a participant A uses two prime numbers p=13 and q=17 to genrate her public and
private keys. If the public key of A is 35, then the privae key of A is __________.
(A) 11
(B) 13
(C ) 7
(D) 9
Answer : (A)
3) Anand digitally signs a message and sends it to Salim. Verification of the signature by Salim requires
Answer : (A)
4) Which of the following are used to generate a message digest by the network security protocols?
(P) RSA (Q) SHA-1 (R) DES (S) MD5
Answer : (C)
5) Using public key cryptography, X adds a digital signature σ to message M, encrypts <M, σ>, and sends it to
Y, where it is decrypted. Which one of the following sequences of keys is used for the operations?
(A) Encryption: X’s private key followed by Y’s private key; Decryption: X’s public key followed by Y’s public key
(B) Encryption: X’s private key followed by Y’s public key; Decryption: X’s public key followed by Y’s private key
(C) Encryption: X’s public key followed by Y’s private key; Decryption: Y’s public key followed by X’s private key
(D) Encryption: X’s private key followed by Y’s public key; Decryption: Y’s private key followed by X’s public key
Answer : (D)
6) In the RSA public key cryptosystem, the private and public keys are (e,n) and (d,n) respectively,
where n=p*q and p and q are large primes. Besides, n is public and p and q are private. Let M be an integer such
that 0<M<n and Φ(n) = (p-1)(q-1). Now consider the following equations.
I. M' = Me mod n
M =(M')d mod n
II. ed ≡≡ 1mod n
III. ed ≡≡ 1mod Φ(n)
IV. M' = Me mod Φ(n)
M = (M')d mod Φ(n)
Which of the above equations correctly represent RSA cryptosystem?
(A) I and II
(B) I and III
(C) II and IV
(D) III and IV
Answer: (B)
i. A hash function (these are often used for computing digital signatures) is an injective function.
ii. Encryption technique such as DES performs a permutation on the elements of its input alphabet.
Which one of the following options is valid for the above two statements?
Answer : (C)
S2- traceroute uses the "Destination port unreachable" ICMP error message.
Answer: (B)
9) An attacker sits between customer and Banker, and captures the information from the customer
and retransmits to the banker by altering the information. This attack is called as ______.
Answer : (B)
10) Encrypt the plain text Message “EXTRANET” using Transposition cipher technique with the following
key:
(A) TAXERTZENZ
(B) EXTRANETZZ
(C) EZXZTRZANZET
(D) EXTZRANZETZ
Answer : (A)
11) Which of the following encryption algorithms is based on the Fiestal struture?
(A) AES
(B) RSA
(C) DES
(D) RC4
Answer : (C)
(A) X.25
(B) X.301
(C) X.409
(D) X.509
Answer : (D)
a. Masquerade
b. Modification of message
c. Denial of service
d. Traffic analysis
a. Data Confidentiality
b. Data Integrity
c. Authentication
d. None of the above
15) Consider that B wants to send a message m that is digitally signed to A. Let the pair of
private and public keys for A and B be denoted by Kx- and Kx+ for x=A,B, respectively. Let
Kx(m) represent the operation of encrypting m with a key K x and H(m) represent the message
digest. Which of the following indicates the correct way of sending the message m along with
the digital signature to A?
(A){m,KB+(H(m))}
(C) ){m,KA-(H(m))}
(D) ){m,KA+(H(m))}
Answer : (B)