CUET-PG SERIES Data-science-a-i-cyber-security-and-computer-sci
Cryptography Network Security
6 previous year questions.
Volume: 6 Ques
Yield: Medium
High-Yield Trend
6
2024 Chapter Questions 6 MCQs
01
PYQ 2024
medium
data-science-a-i-cyber-security-and-computer-sci ID: cuet-pg-
The best-known multiple-letter encryption cipher is:
1
Caesar cipher
2
Hill cipher
3
Playfair cipher
4
Block cipher
02
PYQ 2024
medium
data-science-a-i-cyber-security-and-computer-sci ID: cuet-pg-
Rail fence technique is an example of:
1
Substitution Cipher
2
Transposition Cipher
3
Product Cipher
4
Caesar Cipher
03
PYQ 2024
medium
data-science-a-i-cyber-security-and-computer-sci ID: cuet-pg-
Computation of the discrete logarithm is the basis of the cryptographic system:
1
Symmetric key cryptography
2
Asymmetric cryptography
3
Diffie-Hellman key exchange
4
Secret key cryptography
04
PYQ 2024
medium
data-science-a-i-cyber-security-and-computer-sci ID: cuet-pg-
Which is not a requirement of digital signatures:
1
Having a public-private key pair
2
Being computationally feasible
3
Being easily recognizable
4
Being easily verifiable
05
PYQ 2024
medium
data-science-a-i-cyber-security-and-computer-sci ID: cuet-pg-
In the DES algorithm, the round input is 32 bits, which is expanded to 48 bits via:
1
Scaling of the existing bits
2
Duplication of the existing bits
3
Addition of zeros
4
Addition of ones
06
PYQ 2024
medium
data-science-a-i-cyber-security-and-computer-sci ID: cuet-pg-
In which theorem mod p where p is prime and a is a positive integer not divisible by p
1
Eulerβs theorem
2
Wilsonβs theorem
3
Chinese Remainder theorem
4
Fermatβs theorem