Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
D. All of the above
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
512 bits
1024 bits
N x 1024bits
N x 512 bits
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
512 bits
1024 bits
2048 bits
None of the above
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
UWP
NUS
WUP
QSL
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
Data Confidentiality
Data Integrity
Authentication
None of the above
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
Systematic
Symmetric
Asymmetric
None of the mentioned above
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
Encrypt
Decrypt
Both A and B
All of the mentioned above
Word, number, or phrase
Special Symbols
Function Keys
All of these
Masquerade
Modification of message
Denial of service
Traffic analysis
i.
iii.
All of the mentioned
None of the mentioned
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
Public-key cryptography
Private-key cryptography
Both
None of these
Message Field
Message Digest
Message Score
Message Leap
1
4
6
3
System approach
Cyber safe
Cryptography
None of the mentioned above
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
Output type
Input type
Process type
All of the mentioned above
Fixed size
Variable
Integration
All of the mentioned above
asymmetric-key
logical-key
symmetric-key
None of these