Computer Networks-Network Security - Public Key and Private Key Cryptography (GATE Computer Science): Questions 1 - 7 of 12

Get 1 year subscription: Access detailed explanations (illustrated with images and videos) to 913 questions. Access all new questions we will add tracking exam-pattern and syllabus changes. View Sample Explanation or View Features.

Rs. 450.00 or

Question number: 1

» Computer Networks » Network Security - Public Key and Private Key Cryptography

MCQ▾

Question

DES stands for

Choices

Choice (4) Response

a.

Diagram Encryption Standard

b.

Data Encryption System

c.

Data Encryption Standard

d.

None of the above

Question number: 2

» Computer Networks » Network Security - Public Key and Private Key Cryptography

MCQ▾

Question

________ there is no substitution of characters but only change of their locations change.

Choices

Choice (4) Response

a.

A transposition cipher

b.

Substitution cipher

c.

Mono alphabetic cipher

d.

None of the above

Question number: 3

» Computer Networks » Network Security - Public Key and Private Key Cryptography

MCQ▾

Question

Asymmetric keys contains ________

Choices

Choice (4) Response

a.

key

b.

public-key

c.

Private Key

d.

Both b. and c. are correct

Question number: 4

» Computer Networks » Network Security - Public Key and Private Key Cryptography

MCQ▾

Question

In ________ each occurrence of a character can have a different Substitute.

Choices

Choice (4) Response

a.

Poly alphabetic cipher

b.

Mono alphabetic cipher

c.

Substitution cipher

d.

Question does not provide sufficient data or is vague

Question number: 5

» Computer Networks » Network Security - Public Key and Private Key Cryptography

MCQ▾

Question

The ________ creates a compressed image of finger print.

Choices

Choice (4) Response

a.

Function

b.

Table function

c.

Hash function

d.

None of the above

Question number: 6

» Computer Networks » Network Security - Public Key and Private Key Cryptography

MCQ▾

Question

________ a character (or a symbol) in the plaintext is always changed to the same character (or symbol) in the cipher text.

Choices

Choice (4) Response

a.

Mono alphabetic cipher

b.

Substitution cipher

c.

Poly alphabetic cipher

d.

Question does not provide sufficient data or is vague

Question number: 7

» Computer Networks » Network Security - Public Key and Private Key Cryptography

MCQ▾

Question

Which cryptography, the same key is used by both parties?

Choices

Choice (4) Response

a.

symmetric-key

b.

Primary Key

c.

Asymmetric-key

d.

Both a. and c. are correct

Sign In