Home
Current Affairs January 2024

What is the correct answer?

4

_____ and ______ protocol models can be extended to Entangled particles theory.

A. SARG04 and HTTP

B. FTP and SSP

C. SARG04 and SSP

D. HTTP and FTP

Correct Answer :

C. SARG04 and SSP


SARG04 and SSP protocol models can be extended to Entangled particles theory.

Related Questions

What is the correct answer?

4

Amongst which of the following is/ are true with reference to step-by-step breakdown of the process of quantum cryptography,

A. The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment

B. Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon

C. Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent

D. All of the mentioned above

What is the correct answer?

4

What is the output of a cryptographic hash function means?

A. A variable set of bits

B. A fixed set of bits, derived from one-way mathematical operations

C. An output which may be easily discovered by an adversary

D. Outputs of such functions are of no importance

What is the correct answer?

4

All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options

A. i.

B. iii.

C. All of the mentioned

D. None of the mentioned

What is the correct answer?

4

Which of the following modes of operation in DES is used for operating?

A. Cipher Feedback Mode (CFB)

B. Cipher Block chaining (CBC)

C. Electronic code book (ECB)

D. Output Feedback Modes (OFB)

What is the correct answer?

4

Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?

A. Hill Cipher

B. Playfair cipher

C. Both a and b

D. None of the above

What is the correct answer?

4

ElGamal encryption system is an asymmetric key encryption algorithm.

A. Public-key cryptography

B. Private-key cryptography

C. Both

D. None of these

What is the correct answer?

4

Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.

A. 16 bits

B. 64 bits

C. 32 bits

D. All of the mentioned above

What is the correct answer?

4

Which of the following options correctly defines the Brute force attack?

A. Brutally forcing the user to share the useful information like pins and passwords.

B. Trying every possible key to decrypt the message.

C. One entity pretends to be some other entity

D. The message or information is modified before sending it to the receiver.

What is the correct answer?

4

Among the following given options, chose the strongest encryption technique?

A. DES ( Data Encryption Standard)

B. Double DES

C. Triple DES

D. AES (Advance Encryption Standard)

What is the correct answer?

4

Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:

A. 42

B. 93

C. 114

D. 103

What is the correct answer?

4

Which of the following is the main disadvantage of the ECB (Electronic Code Book)?orWhich of the following is the major drawback of ECB?

A. It requires large block size

B. Padding is done to make the plain text divisible into blocks of fixed size

C. It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.

D. None of the above

What is the correct answer?

4

For which of the following should EBC (Electronic Code Book) process not be used for encryption?

A. For large block sizes

B. For fixed block sizes

C. For small block sizes

D. None of the above

What is the correct answer?

4

Cryptographic hashing provides a barrier to potential _______.

A. Attackers

B. Sender

C. Receiver

D. None of the mentioned above

What is the correct answer?

4

What is the output of the N 1024-bit blocks from the Nth stage in this?

A. 512 bits

B. 1024 bits

C. N x 1024bits

D. N x 512 bits

What is the correct answer?

4

To encrypt the plaintext, a cryptographic algorithm works in combination with a key...

A. Word, number, or phrase

B. Special Symbols

C. Function Keys

D. All of these

What is the correct answer?

4

The Hash Function takes an input of arbitrary length and converts it into a fixed length output.Which of the following names can we use for denoting the output of the hash function?

A. Hash value

B. Hash Code

C. Message Digest

D. All of the above

What is the correct answer?

4

An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.

A. Randomize the decryption

B. Randomize the encryption

C. Minimize and maximize the randomization

D. None of the mentioned above

What is the correct answer?

4

When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?

A. f function

B. permutation p

C. swapping of halves

D. xor of subkey with function f

What is the correct answer?

4

Which of the following options is not correct according to the definition of the Cipher Block Chaining (CBC)?

A. CBC is a mode of operation for stream ciphers.

B. Initialization vector (IV) is used in CBC in the initial phase.

C. It has better resistive nature towards cryptanalysis than ECB

D. None of the above

What is the correct answer?

4

Conventional cryptography also known as ... encryption.

A. asymmetric-key

B. logical-key

C. symmetric-key

D. None of these

What is the correct answer?

4

A mechanism used to encrypt and decrypt data.

A. Cryptography

B. Algorithm

C. Data flow

D. None of these

What is the correct answer?

4

____ is the message or data that can be readable by the sender.

A. Edited

B. Main Text

C. Plain text

D. All of the mentioned above

What is the correct answer?

4

You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,
Is the given matrix 'A', a valid key to be used for encryption?

A. Yes

B. No

C. Can't be determined

D. Data insufficient

What is the correct answer?

4

Hash functions are used in ___ and have variable levels of complexity and difficulty.

A. System approach

B. Cyber safe

C. Cryptography

D. None of the mentioned above

What is the correct answer?

4

Amongst which of the following is /are good for Hashes,

A. Password protection

B. Data integrity / file verification

C. Digital signatures and virus signatures

D. All of the mentioned above

What is the correct answer?

4

The number of rounds in the AES algorithm depends upon the key size being used.Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?

A. 128 key size: 10 rounds

B. 192 key size: 12 rounds

C. 256 key size: 14 rounds

D. All of the above

What is the correct answer?

4

Which of the following is not a property of Hash Function?

A. Pre-Image Resistance

B. Compression

C. Fixed Length Output

D. None of the above

What is the correct answer?

4

Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.

A. 1024

B. 512

C. 256

D. 1248

What is the correct answer?

4

_____ and ______ protocol models can be extended to Entangled particles theory.

A. SARG04 and HTTP

B. FTP and SSP

C. SARG04 and SSP

D. HTTP and FTP

What is the correct answer?

4

A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?

A. An integer values

B. A square matrix

C. An array of characters (i.e. a string)

D. All of the above