This set of MCQ(multiple choice questions) focuses on the **Cyber Security and Privacy NPTEL Week 8 Answers**

You should practice these questions to improve fundamentals of Cyber security needed for various interviews (like company interview, campus interview, walk-in interview), entrance exams, placements and other competitive exams. All the questions in this particular section are based on only “** Cyber Security and Privacy NPTEL Week 8 Answers**“.

### Course layout

**Week 1: Assignment solutions**Assignment solutions

Week 2:

**Assignment solutions**

**Week 3:**

**Assignment solutions**

**Week 4:****Week 5: Assignment Solutions**

**Week 6:**

**Assignment solutions**

**Week 7:**

**Assignment solutions**

**Week 8:**Assignment solutions

**Week 9:**Assignment solutions

**Week 10:**Assignment solutions

**Week 11:**Assignment solutions

**Week 12:**Assignment solutions

**NOTE:** You can check your answer immediately by clicking show answer button. Moreover, this set of “Cyber Security and Privacy NPTEL Week 8 Answers” contains 10 questions.

Now, start attempting the quiz.

### Cyber Security and Privacy NPTEL Week 8 Answers

**Q1.** Which of the following terms describes the process of making and using codes to secure the transmission of information?

a) Algorithm

b) Cryptography

c) Steganography

d) Cryptanalysis

Answer: b) Cryptography

**Q2.** What is term is used to describe a cryptographic method that incorporates mathematical operations involving both a public key and a private key to enchipher or decipher a message?

a) Private-key encryption

b) Symmetric encryption

c) Advanced Encryption Standard (AES)

d) Asymmetric encryption

Answer: d) Asymmetric encryption

**Q3.** A sunstitution cipher that incorporates two or more alphabets in the encryption process is called _____________.

a) Monoalphabetic substitution

b) Block cipher substitution

c) Stream cipher substitution

d) Polyalphabetic substitution

Answer: d) Polyalphabetic substitution

**Q4.** The current standard for the encryption of data, as specified by NIST ___________ is based on the Rijndael algorithm, which was developed by Vincent Rijmen and Joan Daemen.

a) DES

b) RSA

c) AES

d) Message Digest

Answer: c) AES

**Q5.** True or False:

Nonrepudiation means that customers or partners can be held accountable for transaction, such as online purchase, which they cannot later deny.

a) True

b) False

Answer: a) True

**Q6.** Limited-use symmetric keys for temporary communications during an online session is called

a) Session keys

b) One-time padding

c) AES

d) DES

Answer: a) Session keys

**Q7.** Match the following:

a) A-3, B-5, C-4, D-1, E-2

b) A-2, B-1, C-4, D-5, E-3

c) A-4, B-2, C-3, D-1, E-1

d) A-5, B-2, C-3, D-1, E-4

Answer: b) A-2, B-1, C-4, D-5, E-3

**Q8.** Suppose that everyone in a group of N people wants to communicate secretly with the N-1 others using a symmteric key cryptographic system. Communication between any two persons should not be decodable by others in the group. The number of keys required in the system as a whole to satisfy the confidentiality requirement is

a) 2N

b) N(N-1)

c) N(N-1)/2

d) (N-1)/2

Answer: c) N(N-1)/2

**Q9.** Decrypt the following message if it was encrypted using a shift cipher with a shift of 3.

Message: NPTELINFORMATION

a) Q S W H O L Q I R U P W L R Q

b) Q S W H O L Q I T U P W L R Q

c) Q S W F O L Q I R V P W L R Q

d) Q S W H O L Q I R V P W L R Q

Answer: b) Q S W H O L Q I T U P W L R Q

**Q10.** _____________ security protocols are used to protect e-mail

a) SMTP

b) HTTPS

c) S/MIME, PEM, and PGP

d) Telnet

Answer: c) S/MIME, PEM, and PGP

**Q11.** What is the most popular encryption system used over the web?

a) Diffie Hellman key exchange

b) RSA

c) Block cipher

d) DES

Answer: d) DES

**<< Prev- Cyber Security and Privacy Week 7 Assignment Solutions**

**>> Next- Cyber Security and Privacy** **Week 9 Assignment Solutions**

DISCLAIMER:Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

**Programming in Java **NPTEL week 1 quiz answers

**Nptel – Deep Learning assignment solutions**

*For discussion about any question, join the below comment section. And get the solution of your query.* Also, try to share your thoughts about the topics covered in this particular quiz.