GOVERNMENT ARTS AND SCIENCE COLLEGE, 7.
7. Which of these is used for digital GOVERNMENT ARTS AND SCIENCE COLLEGE, 7. Which of these is used for digital
KOMARAPALAYAM - 638183 signatures? KOMARAPALAYAM - 638183 signatures?
DEPARTMENT OF COMPUTER SCIENCE A) AES B) DES C) RSA D) Blowfish DEPARTMENT OF COMPUTER SCIENCE A) AES B) DES C) RSA D) Blowfish
II M. Sc COMPUTER SCIENCE II M. Sc COMPUTER SCIENCE
(2024 - 2026 BATCH) – ODD SEMESTER (2024 - 2026 BATCH) – ODD SEMESTER
8. What is the output of a hash function 8. What is the output of a hash function
INTERNAL TEST –1 called? INTERNAL TEST –1 called?
A) Ciphertext B) Plaintext A) Ciphertext B) Plaintext
Date : C) Key D) Digest Date : C) Key D) Digest
Marks : 50 Marks : 50
Time : 2.00 hrs 9. Which protocol secures email Time : 2.00 hrs 9. Which protocol secures email
communication? communication?
NETWORK SECURITY & CRYPTOGRAPHY NETWORK SECURITY & CRYPTOGRAPHY
A) FTP B) SNMP C) SMTP D) PGP A) FTP B) SNMP C) SMTP D) PGP
Part A 10. What type of attack involves intercepting Part A 10. What type of attack involves intercepting
1* 10= 10 data in transit? 1* 10= 10 data in transit?
CHOOSE THE CORRECT ANSWER A) Phishing B) Man-in-the-Middle CHOOSE THE CORRECT ANSWER A) Phishing B) Man-in-the-Middle
C) DDoS D) Brute-force Bottom of Form C) DDoS D) Brute-force Bottom of Form
1. Which of the following is used to ensure 1. Which of the following is used to ensure
data integrity? Part B data integrity? Part B
A) Encryption B) Hash function 2*5=10 A) Encryption B) Hash function 2*5=10
C) Firewall D) Digital certificate C) Firewall D) Digital certificate
Answer the following questions (Any two) Answer the following questions (Any two)
2. What does the acronym SSL stand for? 1) Explain stream & Block cipher ? 2. What does the acronym SSL stand for? 1) Explain stream & Block cipher ?
A) Secure Socket Layer 2) Explain about the symmetric algorithms ? A) Secure Socket Layer 2) Explain about the symmetric algorithms ?
B) Secure System Login 4) Brief Explain in Digital Signature & B) Secure System Login 4) Brief Explain in Digital Signature &
C) Secure Software Login Authentication protocol ? C) Secure Software Login Authentication protocol ?
D) System Socket Layer D) System Socket Layer
3. In cryptography, what is a cipher? Part C 3. In cryptography, what is a cipher? Part C
A) A type of malware 3*10=30 A) A type of malware 3*10=30
B) A technique for secure data deletion B) A technique for secure data deletion
C) An algorithm for encryption and Answer the following Questions (Any C) An algorithm for encryption and Answer the following Questions (Any
decryption three) decryption three)
D) A protocol for email D) A protocol for email
1) Types of cryptography ? 1) Types of cryptography ?
4. Which of the following is not a type of 2) How Hash and Mac algorithm works? 4. Which of the following is not a type of 2) How Hash and Mac algorithm works?
firewall? Explain & details? firewall? Explain & details?
A) Packet-filtering firewall 3) Diffie Hellman key exchange ? A) Packet-filtering firewall 3) Diffie Hellman key exchange ?
B) Proxy firewall 4) Discuss in detail about RSA algorithm ? B) Proxy firewall 4) Discuss in detail about RSA algorithm ?
C) Antivirus firewall C) Antivirus firewall
D) Stateful inspection firewall D) Stateful inspection firewall
5. What is the key feature of symmetric key 5. What is the key feature of symmetric key
encryption? encryption?
A) Uses a public key A) Uses a public key
B) Uses two different keys B) Uses two different keys
C) Uses the same key for encryption and C) Uses the same key for encryption and
decryption decryption
D) No key is used D) No key is used
6. Which of the following provides 6. Which of the following provides
confidentiality in data transmission? confidentiality in data transmission?
A) Hashing B) Encryption A) Hashing B) Encryption
C) Authentication D) Digital Signature C) Authentication D) Digital Signature