# Cyber security and privacy | NPTEL | Week 8 Answers

This set of MCQ(multiple choice questions) focuses on the Cyber Security and Privacy NPTEL Week 8 Answers

You should practice these questions to improve fundamentals of Cyber security needed for various interviews (like company interview, campus interview, walk-in interview), entrance exams, placements and other competitive exams. All the questions in this particular section are based on only “Cyber Security and Privacy NPTEL Week 8 Answers“.

### Course layout

Week 1: Assignment solutions
Week 2:
Assignment solutions
Week 3:
Assignment solutions
Week 4:
Assignment solutions

Week 5: Assignment Solutions
Week 6: Assignment solutions
Week 7: Assignment solutions
Week 8: Assignment solutions
Week 9: Assignment solutions
Week 10: Assignment solutions
Week 11: Assignment solutions
Week 12: Assignment solutions

NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Cyber Security and Privacy NPTEL Week 8 Answers” contains 10 questions.

Now, start attempting the quiz.

### Cyber Security and Privacy NPTEL Week 8 Answers

Q1. Which of the following terms describes the process of making and using codes to secure the transmission of information?

a) Algorithm
b) Cryptography
c) Steganography
d) Cryptanalysis

Cyber Security and Privacy NPTEL Week 8 Answers

Q2. What is term is used to describe a cryptographic method that incorporates mathematical operations involving both a public key and a private key to enchipher or decipher a message?

a) Private-key encryption
b) Symmetric encryption
d) Asymmetric encryption

Q3. A sunstitution cipher that incorporates two or more alphabets in the encryption process is called _____________.

a) Monoalphabetic substitution
b) Block cipher substitution
c) Stream cipher substitution
d) Polyalphabetic substitution

Q4. The current standard for the encryption of data, as specified by NIST ___________ is based on the Rijndael algorithm, which was developed by Vincent Rijmen and Joan Daemen.

a) DES
b) RSA
c) AES
d) Message Digest

Cyber Security and Privacy NPTEL Week 8 Answers

Q5. True or False:
Nonrepudiation means that customers or partners can be held accountable for transaction, such as online purchase, which they cannot later deny.

a) True
b) False

Q6. Limited-use symmetric keys for temporary communications during an online session is called

a) Session keys
c) AES
d) DES

Q7. Match the following:

a) A-3, B-5, C-4, D-1, E-2
b) A-2, B-1, C-4, D-5, E-3
c) A-4, B-2, C-3, D-1, E-1
d) A-5, B-2, C-3, D-1, E-4

Answer: b) A-2, B-1, C-4, D-5, E-3

Cyber Security and Privacy NPTEL Week 8 Answers

Q8. Suppose that everyone in a group of N people wants to communicate secretly with the N-1 others using a symmteric key cryptographic system. Communication between any two persons should not be decodable by others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is

a) 2N
b) N(N-1)
c) N(N-1)/2
d) (N-1)/2

Q9. Decrypt the following message if it was encrypted using a shift cipher with a shift of 3.
Message: NPTELINFORMATION

a) Q S W H O L Q I R U P W L R Q
b) Q S W H O L Q I T U P W L R Q
c) Q S W F O L Q I R V P W L R Q
d) Q S W H O L Q I R V P W L R Q

Answer: b) Q S W H O L Q I T U P W L R Q

Q10. _____________ security protocols are used to protect e-mail

a) SMTP
b) HTTPS
c) S/MIME, PEM, and PGP
d) Telnet

Answer: c) S/MIME, PEM, and PGP

Cyber Security and Privacy NPTEL Week 8 Answers

Q11. What is the most popular encryption system used over the web?

a) Diffie Hellman key exchange
b) RSA
c) Block cipher
d) DES

Cyber Security and Privacy NPTEL Week 8 Answers

<< Prev- Cyber Security and Privacy Week 7 Assignment Solutions

>> Next- Cyber Security and Privacy Week 9 Assignment Solutions

`DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.`

Programming in Java NPTEL week 1 quiz answers

Nptel – Deep Learning assignment solutions

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.