Variety
Validity
Veracity
None of the mentioned above
B. Validity
Yes
No
Can't be determined
Data insufficient
Reverse order
Next order
Both A and B
All of the mentioned above
Masquerade
Modification of message
Denial of service
Traffic analysis
512 bits
1024 bits
2048 bits
None of the above
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
Caesar cipher
Vernam cipher
Playfair cipher
None of the above
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
Password Check
Data Integrity check
Digital Signatures
Data retrieval in its original form
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
Data Confidentiality
Data Integrity
Authentication
None of the above
Resource reservation protocol
SCTP
TLS
ECN
Authentication
Non repudiation
Data Integrity
All of the above
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
16 bits
64 bits
32 bits
All of the mentioned above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
Passcode or a password
Developed code
Network set
None of the mentioned above
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Attackers
Sender
Receiver
None of the mentioned above
512 bits
1024 bits
N x 1024bits
N x 512 bits
Avalanche effect
Completeness
Both a. and b.
None of the above
Sender
Receiver
Sender and receiver
All the connected devices to the network
Next block
Previous block
Middle block
All of the mentioned above
1024
512
256
1248
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
For large block sizes
For fixed block sizes
For small block sizes
None of the above
Abstract view
Mathematical function
Both A and B
None of the mentioned above