Ics Mcqs Shift2
Ics Mcqs Shift2
Ics Mcqs Shift2
T F 5. Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a
ciphertext block of 64 bits.
T F 6. Modes of operation are the alternative techniques that have been developed
to increase the security of symmetric block encryption for large sequences of data.
T F 9. Like the MAC, a hash function also takes a secret key as input.
T F 10. The strength of a hash function against brute-force attacks depends solely
on the length of the hash code produced by the algorithm.
T F 13. The purpose of the DSS algorithm is to enable two users to securely reach
agreement about a shared secret that can be used as a secret key for subsequent
symmetric encryption of messages.
5. The most important symmetric algorithms, all of which are block ciphers, are the
DES, triple DES, and the __________.
A. SHA B. RSA C. AES D. DSS
6. If the only form of attack that could be made on an encryption algorithm is brute-
force, then the way to counter such attacks would be to __________ .
A. use longer keys B. use shorter keys C. use more keys D. use less keys
9. __________ is a block cipher in which the plaintext and ciphertext are integers
between 0 and n-1 for some n.
A. DSS B. RSA C. SHA C. AES
10. A __________ is created by using a secure hash function to generate a hash value
for a message and then encrypting the hash code with a private key.
A. digital signature B. keystream C. one way hash function D. secret
key
12. Digital signatures and key management are the two most important applications of
__________ encryption.
A. private-key B. public-key C. preimage resistant D. advanced
14. Combined one byte at a time with the plaintext stream using the XOR operation, a
__________ is the output of the pseudorandom bit generator.
A. keystream B. digital signature
C. secure hash D. message authentication code
15. A _________ protects against an attack in which one party generates a message for
another party to sign.
A. data authenticator B. strong hash function
C. weak hash function D. digital signature
3. The __________ algorithm takes the ciphertext and the secret key and produces
the original plaintext.
8. The two criteria used to validate that a sequence of numbers is random are
independence and _________ .
9. A _________ is a hardware device that sits between servers and storage systems
and encrypts all data going from the server to the storage system and decrypts
data going in the opposite direction.
10. In July 1998 the __________ announced that it had broken a DES encryption
using a special purpose “DES cracker” machine.
12. A __________ stream is one that is unpredictable without knowledge of the input
key and which has an apparently random character.
13. The __________ is a pair of keys that have been selected so that if one is used for
encryption, the other is used for decryption.
14. __________ is provided by means of a co-processor board embedded in the tape
drive and tape library hardware.
15. The purpose of the __________ algorithm is to enable two users to securely
reach agreement about a shared secret that can be used as a secret key for
subsequent symmetric encryption of messages.
Answers
TRUE/FALSE QUESTIONS:
1. T
2. T
3. F
4. T
5. F
6. T
7. F
8. T
9. F
10. T
11. T
12. F
13. F
14. T
15. T