This set of MCQ(multiple choice questions) focuses on the Cyber Security and Privacy NPTEL Week 8 Answers
You should practice these questions to improve fundamentals of Cyber security needed for various interviews (like company interview, campus interview, walk-in interview), entrance exams, placements and other competitive exams. All the questions in this particular section are based on only “Cyber Security and Privacy NPTEL Week 8 Answers“.
Course layout
Week 1: Assignment solutions
Week 2: Assignment solutions
Week 3: Assignment solutions
Week 4: Assignment solutions
Week 5: Assignment Solutions
Week 6: Assignment solutions
Week 7: Assignment solutions
Week 8: Assignment solutions
Week 9: Assignment solutions
Week 10: Assignment solutions
Week 11: Assignment solutions
Week 12: Assignment solutions
NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Cyber Security and Privacy NPTEL Week 8 Answers” contains 10 questions.
Now, start attempting the quiz.
Cyber Security and Privacy NPTEL Week 8 Answers
Q1. Which of the following terms describes the process of making and using codes to secure the transmission of information?
a) Algorithm
b) Cryptography
c) Steganography
d) Cryptanalysis
Answer: b) Cryptography
Q2. What is term is used to describe a cryptographic method that incorporates mathematical operations involving both a public key and a private key to enchipher or decipher a message?
a) Private-key encryption
b) Symmetric encryption
c) Advanced Encryption Standard (AES)
d) Asymmetric encryption
Answer: d) Asymmetric encryption
Q3. A sunstitution cipher that incorporates two or more alphabets in the encryption process is called _____________.
a) Monoalphabetic substitution
b) Block cipher substitution
c) Stream cipher substitution
d) Polyalphabetic substitution
Answer: d) Polyalphabetic substitution
Q4. The current standard for the encryption of data, as specified by NIST ___________ is based on the Rijndael algorithm, which was developed by Vincent Rijmen and Joan Daemen.
a) DES
b) RSA
c) AES
d) Message Digest
Answer: c) AES
Q5. True or False:
Nonrepudiation means that customers or partners can be held accountable for transaction, such as online purchase, which they cannot later deny.
a) True
b) False
Answer: a) True
Q6. Limited-use symmetric keys for temporary communications during an online session is called
a) Session keys
b) One-time padding
c) AES
d) DES
Answer: a) Session keys
Q7. Match the following:
a) A-3, B-5, C-4, D-1, E-2
b) A-2, B-1, C-4, D-5, E-3
c) A-4, B-2, C-3, D-1, E-1
d) A-5, B-2, C-3, D-1, E-4
Answer: b) A-2, B-1, C-4, D-5, E-3
Q8. Suppose that everyone in a group of N people wants to communicate secretly with the N-1 others using a symmteric key cryptographic system. Communication between any two persons should not be decodable by others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is
a) 2N
b) N(N-1)
c) N(N-1)/2
d) (N-1)/2
Answer: c) N(N-1)/2
Q9. Decrypt the following message if it was encrypted using a shift cipher with a shift of 3.
Message: NPTELINFORMATION
a) Q S W H O L Q I R U P W L R Q
b) Q S W H O L Q I T U P W L R Q
c) Q S W F O L Q I R V P W L R Q
d) Q S W H O L Q I R V P W L R Q
Answer: b) Q S W H O L Q I T U P W L R Q
Q10. _____________ security protocols are used to protect e-mail
a) SMTP
b) HTTPS
c) S/MIME, PEM, and PGP
d) Telnet
Answer: c) S/MIME, PEM, and PGP
Q11. What is the most popular encryption system used over the web?
a) Diffie Hellman key exchange
b) RSA
c) Block cipher
d) DES
Answer: d) DES
<< Prev- Cyber Security and Privacy Week 7 Assignment Solutions
>> Next- Cyber Security and Privacy Week 9 Assignment Solutions
DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.
Programming in Java NPTEL week 1 quiz answers
Nptel – Deep Learning assignment solutions
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.