# Computer Hardware and Networking/Information and Network Security Set 2 Sample Test,Sample questions

## Question: ` DES follows_________.`

1.SP Networks

2.Feistel Cipher Structure

3.Caesars Cipher

4.Hash Algorithm

1. 12

2.11

3.10

4.8

1. 60 words

2.32 words

3.52 words

4. 44 words

1.1023

2.2432

3.2412

4.3031

## Question: ` In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via____________.`

3.Duplication of the existing bits

4.Scaling of the existing bits

1.48, 32

2.32, 32

3.56, 24

4.64,32

1. 78

2.45

3.124

4.25

1.18

2.12

3.26

4.28

1. 16

2.9

3.12

4.18

1.36 bits

2.16 bits

3.40 bits

4. 8 bits

1.OF

2.B CTR

3.CBC

4.ECB

1.OF

2.B CTR

3.CBC

4.ECB

1. 36 bits

2.16 bits

3.40 bits

4.8 bits

1.Steganography

2.Chorography

3.Tomography

4.Cryptography

1. 32432

2.19367

3.12543

4.35212

1.122

2.143

3.111

4.88

1.64

2.11

3.64

4.23

1.5

2.12

3.43

4.54

1.C=23

2. C=56

3.C=92

4. C=80

## Question: `For the AES-128 algorithm there are __________ similar rounds and _________ roundis different.`

1.9 ; the last

2. 8 ; the first and last

3.10 ; no

4.2 pair of 5 similar rounds ; every alternate

1.10

2.8

3.2

4.5

1.16

2.12

3.14

4.10

1.1 and 4

2.3 and 4

3.Both 4

4.4 and 3

1.(p+1)(q+1)

2.(p-1)(q-1)

3. (p)(q)

4.(p)/(q)

## Question: `In the RSA algorithm, we select 2 random large values â€˜pâ€™ and â€˜qâ€™. Which of the following is the property of â€˜pâ€™ and â€˜qâ€™?`

1.p/q should give no remainder

2.p and q should be prime

3.p and q should be co-prime

4.p and q should be divisible by Ð¤(n)

1.2

2.4

3.5

4.6

## Question: `On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?`

1.Permutation P

2.Swapping of halves

3.XOR of subkey with function f

4.F function

1. Cracking

2.Decryption

3.Suspicion

4.Encryption

1.43

2.14

3.112

4. 54

1.58

2.34

3.123

4.57

1.True

2.False

3.none

4. all

1. Permutations

2.Transitions

3.Words

4.States

1. 16 Bits

2.32 Bits

3.64 Bits

4.128 Bits

1.4Ã—8

2.8Ã—8

3.12Ã—8

4.16Ã—8

1. True

2.False

3.none

4.all

## Question: `The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.`

1.Program file

2.Special file

3. Ordinary file

4. Encrypted file

1.4

2.8

3.12

4.16

1.True

2.False

3.none

4. all

## Question: `There is an addition of round key before the start of the AES round algorithms.`

1.True

2.False

3.none

4.All of the mentioned

1.60 words

2.32 words

3.52 words

4.44 words

## Question: `What is the key size in the S-AES algorithm?`

1.32 bits

2.24 bits

3. 16 bits

4.None of the mentioned

1.840

2.168

3.1344

4.1024

1.Rijndael

2.RC6

3.Blowfish

4.MARS

1.EC

2.B CB

3.CTR

4.OFB

1. EC

2.B CB

3.CBC

4.OFB

## Question: `Which of the following is a faulty S-AES step function?`

1.Mix Columns

3.Byte substitution

4.Shift rows

1.OF

2.B ECB

3.CBC

4.CFB

1. Rijndael

2.Serpent

3.Blowfish

4.JUPITER

## More MCQS

##### Olete Team
Online Exam TestTop Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on Online Exam Testwebsite is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!