1. | The type of encoding in which manipulation of bit streams without regard to what the bits mean is ..................... |
Answer: (b).Entropy encoding
|
2. | Which one of the following is correct ? |
Answer: (d).Character - represented by Unicode
|
3. | The protocol used to provide security to e-mails? |
Answer: (b).PGP
|
4. | The art of breaking ciphers is known as: |
Answer: (c).cryptanalysis
|
5. | The number of subkeys generated in IDEA algorithm are ................. |
Answer: (c).52
|
6. | Number of S - boxes used in DES algorithm is ............... |
Answer: (b).8
|
7. | The ................... portion of LAN management software restricts access, records user activities and audit data etc. |
Answer: (b).Security management
|
8. | In cryptography the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message (spaces are omitted during encryption) WELCOME TO NETWORK SECURITY! |
Answer: (b).EETSICOOCYWMEKRONRU!LTWET
|
9. | The length of the key in one time pad method is .................... |
Answer: (a).Random
|
10. | ............... is an example for public key algorithm. |
Answer: (a).RSA
|