Ethical Hacking | NPTEL 2023 | Week 6 Assignment Solutions

This set of MCQ(multiple choice questions) focuses on the Ethical Hacking week 6 Solutions.

Course layout

Answers COMING SOON! Kindly Wait!

Week 1: Assignment answers
Week 2: Assignment answers
Week 3: Assignment answers
Week 4: Assignment answers
Week 5: Assignment answers
Week 6: Assignment answers
Week 7: Assignment answers
Week 8: Assignment answers
Week 9: Assignment answers
Week 10: Assignment answers
Week 11: Assignment answers
Week 12: Assignment answers

NOTE: You can check your answer immediately by clicking show answer button. This set of “Ethical Hacking week 6 Solutions” contains 10 questions.

Now, start attempting the quiz.

Ethical Hacking week 6 Solutions

Q1. Which of the following is not an example of active security attack?

a) Masquerade
b) Replay
c) Traffic analysis
d) Modification
e) Denial of Service

Answer: c) Traffic analysis

Q2. Consider the following statements:
(i) In symmetric key cryptography, single shared key is used by sender and receiver.
(ii) In Asymmetric key cryptography, separate keys are used by sender and receiver.

a) Only (i) is true
b) Only (ii) is true
c) Both (i) and (ii) are true
d) Both (i) and (ii) are false

Answer: c) Both (i) and (ii) are true

Ethical Hacking week 6 Solutions

Q3. 15 parties want to exchange messages securely using a symmetric key encryption algorithm. The number of distinct key values required will be ___________.

Answer: 105

Q4. Consider a mono-alphabetic cipher with the following key value:
(A B C D I J K L E F G H M N O P U V W X Q R S T Y Z)
What will be the encrypted form of the message “W I N D O W”?

a) W E N D H W
b) S K N G H S
c) S E N D O S
d) None of these

Answer: c) S E N D O S

Q5. How many AES rounds are required for 192-bit key size?

a) 10
b) 11
c) 12
d) 14

Answer: c) 12

Ethical Hacking week 6 Solutions

Q6. What is the key length in data encryption standard (DES)?

a) 56
b) 64
c) 128
d) 192

Answer: a) 56

Q7. 100 parties want to exchange messages securely using some public key encryption technique like RSA. The number of distinct key values required will be __________.

Answer: 200

Ethical Hacking week 6 Solutions

Q8. In Digital signature sender signs a message with its:

a) Private key
b) Public key

Answer: a) Private key

Ethical Hacking week 6 Solutions

Q9. On which difficult mathematical problem does the security of RSA algorithm depend on?

a) Discrete logarithm problem
b) Testing whether a given number if prime or not
c) Prime factorization problem
d) The RSA threshold detection
e) All of these

Answer: c) Prime factorization problem

Q10. Which of the following statement(s) is/are true for Diffie-Hellman Key Exchange algorithm?

a) It allows group of users to agree on secret key over insecure channel.
b) The security of the algorithm depends on prime factorization problem.
c) The algorithm is vulnerable to man-in-the-middle attack.
d) It does not require any prior communication between sender and receiver.
e) All of these.

Answer: a), c), d)

Ethical Hacking week 6 Solutions

Ethical Hacking NPTEL Week 6 Solutions

Q1. 15 parties want to exchange messages securely using a symmetric key encryption algorithm. The number of distinct key values required will be:

a) 30
b) 225
c) 210
d) 105

Answer: d) 105

Ethical Hacking week 6 Solutions

Q2. 200 parties want to exchange messages securely using some public key encryption technique like RSA. The number of distinct key values required will be __________

Answer: 400

Q3. What are the effective key lengths used in DES and triple-DES symmetric key encryption algorithms in bits?

a) 56 and 168
b) 56 and 112
c) 56 and 56
d) 64 and 128
e) None of these

Answer: a) 56 and 168

Ethical Hacking week 6 Solutions

Q4. On which difficult mathematical problem does the security of RSA algorithm depend on?

a) Discrete logarithm problem.
b) Testing whether a given number if prime or not.
c) Prime factorization problem.
d) The RSA threshold detection.
e) All of these

Answer: c) Prime factorization problem.

Q5. Which of the following types of attack can the DoS attack be categorized into?

a) Interruption
b) Interception
c) Modification
d) Fabrication

Answer: a) Interruption

Ethical Hacking week 6 Solutions

Q6. Which of the following terms concern verifying the identity of the sender?

a) Encryption.
b) Authentication.
c) Decryption.
d) None of these.

Answer: b) Authentication.

Q7. Consider a mono-alphabetic cipher with the following key value:
(A B C D I J K L E F G H M N O P U V W X Q R S T Y Z)
What will be the encrypted form of the message “W I N D O W” ?

a) W E N D H W
b) S K N G H S
c) S E N D O S
d) None of these.

Answer: c) S E N D O S

Ethical Hacking week 6 Solutions

Q8. How many AES rounds are required for 128-bit key size?

a) 10
b) 11
c) 12
d)14

Answer: a) 10

Ethical Hacking week 6 Solutions

Q9. For encryption using public-key cryptography, we use the

a) Receiver’s public key
b) Receiver’s private key
c) Sender’s public key
d) Sender’s private key

Answer: a) Receiver’s public key

Q10. Which of the following techniques is/are vulnerable to man-in-the-middle attack?

a) AES
b) RSA
c) Diffle-Hellman key exchange
d) None of these

Answer: c) Diffle-Hellman key exchange

Ethical Hacking week 6 Solutions

<< Prev- Ethical Hacking Week 5 Assignment Solutions

>> Next- Ethical Hacking Week 7 Assignment Solutions


DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *