Quiz
Quiz
Which of the following statements should be used to obtain a remainder after dividing 3.14 by 2.1 ?
a) rem = 3.14 % 2.1;
b) rem = modf(3.14, 2.1);
c) rem = fmod(3.14, 2.1);
d) Remainder cannot be obtain in floating point division.
2.
3.
Which header file can be used to define input/output function prototypes and macros?
a) math.h
b) memory.h
c) stdio.h
d) dos.h
4.
5.
pwd 7VD6DH6A
6.
Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
7.
Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol
8.
cipher
d) cipher text
11. Advanced Encryption Standard (AES), has three different configurations with respect to number of
rounds and
a)
Data Size
b) Round Size
c)
Key Size
d) Encryption Size
12. In Cryptography, original message, before being transformed, is called
a)
Simple Text
b) Plain Text
c)
Empty Text
d) Filled Text
13. This is an encryption/decryption key known only to the party or parties that exchange secret messages.
a) e-signature
b) digital certificate
c) private key
d) security token
14. This was commonly used in cryptography during World War II.
a) tunneling
b) personalization
c) van Eck phreaking
d) one-time pad
15. This is the inclusion of a secret message in otherwise unencrypted text or images.
a) masquerade
b) steganography
c) spoof
d) eye-in-hand system
16. This is a trial and error method used to decode encrypted data through exhaustive effort rather than
employing intellectual strategies.
a) chaffing and winnowing
b) cryptanalysis
c) serendipity
d) brute force cracking
17. The study of secret codes associated with classified information and intelligence gathering is called
a) encryption.
b) Secure Sockets Layers
c) scripting.
d) cryptography.
18. __________ key encryption is risky because the same keys have to be shared by too many people.
a)
b)
c)
d)
Private
Public
Asymmetric
PKI
19. An encoding algorithm that converts an input string into a numerical signature for that string is called
a)
b)
c)
d)
PGP
RSA
a Hash Code
PKI
20. Message _ _ _ _ _ _ means that the sender and the receiver expect privacy.
a)
b)
c)
d)
confidentiality
integrity
authentication
none of the above
Integrity
Confidentiality
Non repudiation
Authentication
SSL
TLS
either A or B
both A and B
AH
ESP
PGP
SSL
b) MAC
c) either A or B
d) neither A nor B