Sunteți pe pagina 1din 4

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

GE6151 COMPUTER PROGRAMMING


INNOVATIVE TEACHING QUIZ
1.

Which of the following statements should be used to obtain a remainder after dividing 3.14 by 2.1 ?
a) rem = 3.14 % 2.1;
b) rem = modf(3.14, 2.1);
c) rem = fmod(3.14, 2.1);
d) Remainder cannot be obtain in floating point division.

2.

Which of the following special symbol allowed in a variable name?


a) * (asterisk)
b) | (pipeline)
c) - (hyphen)
d) _ (underscore)

3.

Which header file can be used to define input/output function prototypes and macros?
a) math.h
b) memory.h
c) stdio.h
d) dos.h

4.

In cryptography, the order of the letters in a message is rearranged by


a) transpositional ciphers
b) substitution ciphers
c) both (a) and (b)
d) none of the mentioned
1481017700 04071991 41200020
2840501863

5.

pwd 7VD6DH6A

What is data encryption standard (DES)?


a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned

6.

Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned

7.

Which one of the following is a cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol

8.

ElGamal encryption system is


a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm

c) not an encryption algorithm


d) none of the mentioned
9.

Cryptographic hash function takes an arbitrary block of data and returns


a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned

10. Shift cipher is sometimes referred to as the


a) Caesar cipher
b) Shift cipher
c)

cipher

d) cipher text
11. Advanced Encryption Standard (AES), has three different configurations with respect to number of
rounds and
a)

Data Size

b) Round Size
c)

Key Size

d) Encryption Size
12. In Cryptography, original message, before being transformed, is called
a)

Simple Text

b) Plain Text
c)

Empty Text

d) Filled Text
13. This is an encryption/decryption key known only to the party or parties that exchange secret messages.
a) e-signature
b) digital certificate
c) private key
d) security token
14. This was commonly used in cryptography during World War II.
a) tunneling
b) personalization
c) van Eck phreaking
d) one-time pad
15. This is the inclusion of a secret message in otherwise unencrypted text or images.
a) masquerade
b) steganography
c) spoof
d) eye-in-hand system
16. This is a trial and error method used to decode encrypted data through exhaustive effort rather than
employing intellectual strategies.
a) chaffing and winnowing
b) cryptanalysis
c) serendipity
d) brute force cracking

17. The study of secret codes associated with classified information and intelligence gathering is called
a) encryption.
b) Secure Sockets Layers
c) scripting.
d) cryptography.

18. __________ key encryption is risky because the same keys have to be shared by too many people.
a)
b)
c)
d)

Private
Public
Asymmetric
PKI

19. An encoding algorithm that converts an input string into a numerical signature for that string is called
a)
b)
c)
d)

PGP
RSA
a Hash Code
PKI

20. Message _ _ _ _ _ _ means that the sender and the receiver expect privacy.
a)
b)
c)
d)

confidentiality
integrity
authentication
none of the above

21. Digital signature cannot provide for the message.


a)
b)
c)
d)

Integrity
Confidentiality
Non repudiation
Authentication

22. _ _ _ _ _ _ _ _ provide security at the transport layer.


a)
b)
c)
d)

SSL
TLS
either A or B
both A and B

23. One security protocol for the e-mail system is


.
a ) IPSec
b) SSL
c) PGP
d) none of the above
24. _ _ _ _ _ _ _ provides either authentication or encryption, or both, for packets at the IP level.
a)
b)
c)
d)

AH
ESP
PGP
SSL

25. . To authenticate the data origin, one needs a(n)


.
a) MDC

b) MAC
c) either A or B
d) neither A nor B

S-ar putea să vă placă și