100% found this document useful (1 vote)
148 views8 pages

QB Online MCQ Exam Unit 1 Ics

This document contains 29 multiple choice questions about various topics in cryptography and cybersecurity. The questions cover cryptographic techniques like Caesar cipher, Playfair cipher, Hill cipher, Vernam cipher, and Rail Fence cipher. They also cover cryptographic principles, types of attacks, network security concepts, and authentication.

Uploaded by

Nisha Mate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
148 views8 pages

QB Online MCQ Exam Unit 1 Ics

This document contains 29 multiple choice questions about various topics in cryptography and cybersecurity. The questions cover cryptographic techniques like Caesar cipher, Playfair cipher, Hill cipher, Vernam cipher, and Rail Fence cipher. They also cover cryptographic principles, types of attacks, network security concepts, and authentication.

Uploaded by

Nisha Mate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

PRIYADARSHINI BHAGWATI COLLEGE OF ENGINEERING,Nagpur

Question Bank for Online MCQ Based Exam


SUBJECT :- INFORMATION AND CYBER SECUITY
Unit -1

1. In Caesar Cipher , What is the Plain Text corresponding to Cipher Text " QXPEHU "
A. THEORY B. MMATHS C. NUMBER D. CRYPTO

2. Consider Keyword :- MONARCHY and Plain Text is LAXMAN ,So find its cipher text by using Play Fair
Encryption.

A. SMUARA B. SNUARA C. MSUARA D. SUMARA

3. State True or False: Hill Cipher is Poly alphabetic Cipher

A. TRUE B. False

4. Lets P,C,K denotes the Plain Text Spaces , Cipher Text Spaces and Key Spaces respectively.In Shift Cipher
P=C=Z26. For 0<=K<=25 , Encryption function ek is defined by ek(x)=........ mod 26 and decryption function dk is
defined by dk(x)=......... mod 26

Option A.

(-X+K),(X-K)

Option B.

(X+K),(X-K)

Option C.

(X+K),(-X-K)

Option D.

(-X+K),(-X-K)

5. Ciphertext depends on the original plaintext message, the algorithm and the ___.

Option A.

attacker

Option B.

Key Value

Option C.

Network

Option D.
None of the above

6. State True or False :- Steganography is a technique to hide a data in the form of network Packet

A.True B. False

7. Decrypt the cipher text HQFUBSWHG WHAW by using Caeser Cipher

Option A.

ABANDONED TEXT

Option B.

ABANDONED LOCK

Option C.

ENCRYPTED TEXT

Option D.

ENCRYPTED LOCK

8. Find cipher text for given plain text by using vigenere cipher. Plain Text is :- " PANKAJ" and Key is :- " DEEPAK ".

Option A.

SREZAT

Option B.

SERZAT

Option C.

ESRZAT

Option D.

RSEZAT

9. Encrypt Plain text " RUPALI " and keyword is " PRASTHAVINA" by using Play Fair encryption technique

Option A.

PRWSMV

Option B.

PWRSMV

Option C.

RPWSMV

Option D.
WPRSMV

10. An attacker sits between customer and Banker, and captures the information from the customer and re-
transmits to the banker by altering the information. This attack is called as ______.

Option A.

Masquerade Attack

Option B.

Replay Attack

Option C.

Passive Attack

Option D.

Denial of Service Attack

11. ______ implies that some portion of a ________ message is altered.

Option A.

Deletion, legitimate

Option B.

Modification, Illegitimate

Option C.

Modification, Legitimate

Option D.

Deletion, Illegitimate

12. The purpose of computer security is to prevent ______ from doing the ______

Option A.

attacks, harm

Option B.

attackers, damage

Option C.
threat, needful

Option D.

employees, interference

13. If Plain Text is " SUMEDHA " & Key is " CHANDNI " Find the encrypted text by Using Vernam Cipher

Option A.

UMBRGUI

Option B.

UBMRGUI

Option C.

BUMRGUI

Option D.

URMBGUI

14. Encrypt Plain text " PRIYADARSHINI" by using Rail Fence Encryption Technique

Option A.

PIAASIIRYDRHN

Option B.

PRYAIDAARHNI

Option C.

INIHSRADAYIRP

Option D.

PRIYAINIHSRDA

15. Encrypt Plain Text "RAJESH " by Using Hill Cipher Technique. Key :- { {2,1},{4,3}}

Option A.

IQWMRP

Option B.

IQMWPR
Option C.

QIWMRP

Option D.

PRMWQI

16. Which of the following cipher techniques include the involvement of matrix operations in their algorithms
of encryption and decryption?

Option A.

Hill Cipher

Option B.

Playfair cipher

Option C.

Both a and b

Option D.

None of the above

17. Which of the following is not a principle of data security?

Option A.

Data Confidentiality

Option B.

Data Integrity

Option C.

Authentication

Option D.

None of the above

18. Which of the following security attacks is not an active attack?

Option A.

Masquerade
Option B.

Modification of message

Option C.

Denial of service

Option D.

Traffic analysis

19. Which of the following options correctly defines the Brute force attack?

Option A.

Brutally forcing the user to share the useful information like pins and passwords.

Option B.

One entity pretends to be some other entity

Option C.

Trying every possible key to decrypt the message.

Option D.

The message or information is modified before sending it to the receiver.

20. Encrypt Plain Text "SALMAN" by using Play Fair Encyption.Key for Encryption is " LOKMAT"

Option A.

OMOAEU

Option B.

UMOAEU

Option C.

UEAOMU

Option D.

MUOAEU

21. Decrypt the cipher text " QFAFSDF " by using Ceaser cipher

Option A.

LAVANYA

Option B.

RITHANYA
Option C.

CHANKYA

Option D.

MERINDA

22. State True or False :- Total number of key available in mono alphabetic cipher is 26 !

A. true B . false

23 State True or False :- In passive attack, attacker modify the content of message.

A. True B. False

24. Caesar Cipher is an example of ..............

Option A.

Poly-alphabetic Cipher

Option B.

Mono-alphabetic Cipher

Option C.

Multi-alphabetic Cipher

Option D.

Bi-alphabetic Cipher

25. State True or False :- Authentication is not a process to verify identification of sender and Receiver.

A. True B. False

26. Network security consists of:

Option A.

Protection

Option B.

Detection

Option C.
Reaction

Option D.

All of the above

27. State True or False :- In active attack ,attacker monitor the data communication as well as modify the
content of message.

A. TRUE B.FALSE

28. State True or False :- Data Integrity mean data send from one end is not similar as data received at other
end.

A. TRUE B. FALSE

29. Consider Plain Text is " MOHAN " and key for Encryption is { {2,3},{1,4} }. find cipher text by using Hill Cipher
Encryption Technique

Option A.

OQOHNN

Option B.

QOOHNN

Option C.

OOQHNN

Option D.

HOQHNN

You might also like