Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views1 page

NSC MSC 3 - Copy (2 Files Merged)

The document is an internal test paper for II M. Sc Computer Science students at Government Arts and Science College, focusing on Network Security and Cryptography. It includes multiple-choice questions and descriptive questions covering topics such as digital signatures, hash functions, email security protocols, and types of cryptography. The test is structured into parts with varying question formats and marks allocation.

Uploaded by

Santhosh. K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views1 page

NSC MSC 3 - Copy (2 Files Merged)

The document is an internal test paper for II M. Sc Computer Science students at Government Arts and Science College, focusing on Network Security and Cryptography. It includes multiple-choice questions and descriptive questions covering topics such as digital signatures, hash functions, email security protocols, and types of cryptography. The test is structured into parts with varying question formats and marks allocation.

Uploaded by

Santhosh. K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

GOVERNMENT ARTS AND SCIENCE COLLEGE, 7.

7. Which of these is used for digital GOVERNMENT ARTS AND SCIENCE COLLEGE, 7. Which of these is used for digital
KOMARAPALAYAM - 638183 signatures? KOMARAPALAYAM - 638183 signatures?
DEPARTMENT OF COMPUTER SCIENCE A) AES B) DES C) RSA D) Blowfish DEPARTMENT OF COMPUTER SCIENCE A) AES B) DES C) RSA D) Blowfish
II M. Sc COMPUTER SCIENCE II M. Sc COMPUTER SCIENCE
(2024 - 2026 BATCH) – ODD SEMESTER (2024 - 2026 BATCH) – ODD SEMESTER
8. What is the output of a hash function 8. What is the output of a hash function
INTERNAL TEST –1 called? INTERNAL TEST –1 called?
A) Ciphertext B) Plaintext A) Ciphertext B) Plaintext
Date : C) Key D) Digest Date : C) Key D) Digest
Marks : 50 Marks : 50
Time : 2.00 hrs 9. Which protocol secures email Time : 2.00 hrs 9. Which protocol secures email
communication? communication?
NETWORK SECURITY & CRYPTOGRAPHY NETWORK SECURITY & CRYPTOGRAPHY
A) FTP B) SNMP C) SMTP D) PGP A) FTP B) SNMP C) SMTP D) PGP

Part A 10. What type of attack involves intercepting Part A 10. What type of attack involves intercepting
1* 10= 10 data in transit? 1* 10= 10 data in transit?
CHOOSE THE CORRECT ANSWER A) Phishing B) Man-in-the-Middle CHOOSE THE CORRECT ANSWER A) Phishing B) Man-in-the-Middle
C) DDoS D) Brute-force Bottom of Form C) DDoS D) Brute-force Bottom of Form
1. Which of the following is used to ensure 1. Which of the following is used to ensure
data integrity? Part B data integrity? Part B
A) Encryption B) Hash function 2*5=10 A) Encryption B) Hash function 2*5=10
C) Firewall D) Digital certificate C) Firewall D) Digital certificate
Answer the following questions (Any two) Answer the following questions (Any two)
2. What does the acronym SSL stand for? 1) Explain stream & Block cipher ? 2. What does the acronym SSL stand for? 1) Explain stream & Block cipher ?
A) Secure Socket Layer 2) Explain about the symmetric algorithms ? A) Secure Socket Layer 2) Explain about the symmetric algorithms ?
B) Secure System Login 4) Brief Explain in Digital Signature & B) Secure System Login 4) Brief Explain in Digital Signature &
C) Secure Software Login Authentication protocol ? C) Secure Software Login Authentication protocol ?
D) System Socket Layer D) System Socket Layer

3. In cryptography, what is a cipher? Part C 3. In cryptography, what is a cipher? Part C


A) A type of malware 3*10=30 A) A type of malware 3*10=30
B) A technique for secure data deletion B) A technique for secure data deletion
C) An algorithm for encryption and Answer the following Questions (Any C) An algorithm for encryption and Answer the following Questions (Any
decryption three) decryption three)
D) A protocol for email D) A protocol for email
1) Types of cryptography ? 1) Types of cryptography ?
4. Which of the following is not a type of 2) How Hash and Mac algorithm works? 4. Which of the following is not a type of 2) How Hash and Mac algorithm works?
firewall? Explain & details? firewall? Explain & details?
A) Packet-filtering firewall 3) Diffie Hellman key exchange ? A) Packet-filtering firewall 3) Diffie Hellman key exchange ?
B) Proxy firewall 4) Discuss in detail about RSA algorithm ? B) Proxy firewall 4) Discuss in detail about RSA algorithm ?
C) Antivirus firewall C) Antivirus firewall
D) Stateful inspection firewall D) Stateful inspection firewall

5. What is the key feature of symmetric key 5. What is the key feature of symmetric key
encryption? encryption?
A) Uses a public key A) Uses a public key
B) Uses two different keys B) Uses two different keys
C) Uses the same key for encryption and C) Uses the same key for encryption and
decryption decryption
D) No key is used D) No key is used

6. Which of the following provides 6. Which of the following provides


confidentiality in data transmission? confidentiality in data transmission?
A) Hashing B) Encryption A) Hashing B) Encryption
C) Authentication D) Digital Signature C) Authentication D) Digital Signature

You might also like