Documente Academic
Documente Profesional
Documente Cultură
Name:.................................................
Instructions:
1. The final exam is currently scheduled for Wednesday 16 November at 9am in Building 4 (GYM). This
might change. Please check your final timetable.
2. The exam will have two parts. Part-1 will have 60 MCQs (one point each), while Part-2 will have short
descriptive questions (40 points total). Part 2 will also include short numerical calculations. Youre
allowed a scientific calculator.
3. You will have to attempt all questions in the exam.
4. Sample questions in the exam are given below.
Part-1: MCQs
1. 1 point Verifying that users are who they say they are and that each input arriving at the system came
from a trusted source is
.
A. authenticity
B. credibility
C. accountability
D. integrity
2. 1 point A
of the ciphertext is obtained.
A. brute-force
B. Caesar attack
C. ciphertext only
D. chosen plaintext
3. 1 point If both parties use only one key over a secure encrypted channel, such a system is referred to
as:
A. public-key encryption
B. two-key
C. asymmetric
D. symmetric encryption
4. 1 point Conidering all other parameters equal, larger block sizes mean greater security for block ciphers.
A. True
B. False
5. 1 point A digital signature can guarantee the source but not the integrity of the message.
A. True
B. False
6. 1 point X.509 defines the format for public-key certificates.
A. True
B. False
7. 1 point Frequent communication between end systems is encrypted using a
key.
A. session
B. master
C. permanent
D. message
8. 1 point A
firewall applies a set of rules to each incoming and outgoing IP packet
and then forwards or discards the packet.
A. host-based
B. packet filtering
C. distributed
D. stateful inspection
b
1
c
2
d
3
e
4
f
5
g
6
.
.
.
.
z
25
A plaintext p=bad is encrypted using a simple substitution cipher. The key used for encryption is
cba. Determine the resulting ciphertext?
12. In order to use public key croptography for digital signatures, of the two keys (public and private), which
key is used for encryption and which key is used for decryption?