CNS Question Paper
CNS Question Paper
Unit-wise questions:
UNIT-I
Multiple choice Questions
1. Which of the following is not a principle of security?
a) Confidentiality
b) Integrity
c) Availability
d) Visibility
Answer: d) Visibility
2. The process of converting plain text into cipher text is called:
a) Decryption
b) Encryption
c) Key exchange
d) Steganography
Answer: b) Encryption
3. Which of the following is an example of a substitution technique?
a) Rail Fence cipher
b) Caesar cipher
c) Columnar transposition
d) Vigenère cipher
Answer: b) Caesar cipher
4. Steganography is used to:
a) Encrypt data
b) Hide data
c) Compress data
d) Decrypt data
Answer: b) Hide data
5. Which key is used in symmetric key cryptography?
a) Single key
b) Pair of keys
c) Private key only
d) Public key only
Answer: a) Single key
6. Transposition techniques are based on:
a) Rearrangement of letters
b) Substitution of letters
c) Key generation
d) Hashing
Answer: a) Rearrangement of letters
7. Which of the following is not a type of security attack?
a) Passive attack
b) Active attack
c) Direct attack
d) Replay attack
Answer: c) Direct attack
8. Plain text is:
a) Encrypted text
b) Decrypted text
c) Original readable message
d) Compressed text
Answer: c) Original readable message
9. Which cryptography uses two keys for encryption and decryption?
a) Symmetric key cryptography
b) Transposition technique
c) Asymmetric key cryptography
d) Steganography
Answer: c) Asymmetric key cryptography
10. Which of the following is a security mechanism?
a) Encipherment
b) Authentication
c) Integrity
d) Availability
Answer: a) Encipherment
11. Which of the following is NOT a principle of security?
a) Confidentiality
b) Integrity
c) Complexity
d) Availability
Answer: c) Complexity
12. Which security approach focuses on preventing attacks before they occur?
a) Reactive security
b) Proactive security
c) Passive security
d) Active security
Answer: b) Proactive security
13. Which attack involves interception and modification of data?
a) Passive attack
b) Active attack
c) Simple attack
d) Null attack
Answer: b) Active attack
14. The process of converting plain text to cipher text is called:
a) Hashing
b) Encryption
c) Decryption
d) Encoding
Answer: b) Encryption
15. Which technique hides the existence of a message rather than encrypting it?
a) Steganography
b) Substitution
c) Transposition
d) Hashing
Answer: a) Steganography
16. Which of the following is a substitution cipher?
a) Caesar cipher
b) Rail fence cipher
c) Columnar transposition
d) Vernam cipher
Answer: a) Caesar cipher
17. In asymmetric key cryptography, the keys used are:
a) Same keys for encryption and decryption
b) Different keys for encryption and decryption
c) No keys used
d) Secret shared keys only
Answer: b) Different keys for encryption and decryption
18. The main purpose of encryption is to ensure:
a) Availability
b) Integrity
c) Confidentiality
d) Authenticity
Answer: c) Confidentiality
19. Which of the following is NOT a type of security service?
a) Confidentiality
b) Integrity
c) Access control
d) Replay attack
Answer: d) Replay attack
20. The strength of encryption mainly depends on:
a) Key size
b) Number of users
c) Algorithm name
d) Plain text size
Answer: a) Key size
21. What is cipher text?
a) Original message
b) Encrypted message
c) Message digest
d) Digital signature
Answer: b) Encrypted message
22. Which of the following is a type of transposition cipher?
a) Vigenère cipher
b) Vernam cipher
c) Columnar cipher
d) Caesar cipher
Answer: c) Columnar cipher
23. Passive attacks include:
a) Modification of message
b) Replay attacks
c) Traffic analysis
d) Denial of Service
Answer: c) Traffic analysis
24. Which principle of security ensures data is accessible to authorized users when
needed?
a) Integrity
b) Confidentiality
c) Availability
d) Authenticity
Answer: c) Availability
25. The security mechanism that ensures the identity of the sender is known as:
a) Confidentiality
b) Authentication
c) Integrity
d) Non-repudiation
Answer: b) Authentication
Descriptive Questions
1.Define and explain the principles of security (Confidentiality, Integrity, Availability, etc.).
Provide real-world examples to illustrate each principle.
2. What are the different types of security attacks? Classify and explain each with suitable
examples. How can organizations protect themselves from these attacks?
3. Describe various security services as defined by ISO. How do these services contribute to a
secure communication system?
4. Explain the different security mechanisms used in computer networks. Illustrate how each
mechanism addresses one or more security threats.
5. With the help of a neat diagram, explain a general model for network security. What are the
components of this model and how do they interact?
6.What is cryptography? Differentiate between plaintext and ciphertext with suitable
examples. Explain the basic goal of cryptography.
7. Discuss in detail the substitution techniques used in classical cryptography. Illustrate with
examples such as Caesar Cipher and Monoalphabetic Cipher.
8. Explain transposition techniques with examples. How do these techniques differ from
substitution techniques in terms of security?
9. What is encryption and decryption? Explain the general process of encryption and
decryption with a neat block diagram.
10. Compare symmetric key cryptography with asymmetric key cryptography. Discuss their
advantages, disadvantages, and use cases
UNIT-II
Multiple choice Questions
1. Which of the following is a block cipher?
a) RC4
b) DES
c) Vernam cipher
d) Vigenère cipher
Answer: b) DES
2. The key size of DES is:
a) 56 bits
b) 64 bits
c) 128 bits
d) 32 bits
Answer: a) 56 bits
3. Which algorithm uses variable key sizes up to 448 bits?
a) AES
b) Blowfish
c) IDEA
d) RC5
Answer: b) Blowfish
4. Which cipher is a stream cipher?
a) DES
b) AES
c) RC4
d) Blowfish
Answer: c) RC4
5. What is the block size of AES?
a) 56 bits
b) 64 bits
c) 128 bits
d) 192 bits
Answer: c) 128 bits
6. Which algorithm uses rounds that depend on the key size?
a) RC5
b) DES
c) Blowfish
d) IDEA
Answer: a) RC5
7. Which of the following is NOT a symmetric key algorithm?
a) DES
b) RSA
c) AES
d) RC4
Answer: b) RSA
8. In RSA, encryption and decryption are performed using:
a) Same key
b) Different keys (public and private)
c) No key
d) Secret shared key only
Answer: b) Different keys (public and private)
9. Diffie-Hellman key exchange is used for:
a) Encrypting data
b) Signing data
c) Exchanging keys securely
d) Hashing data
Answer: c) Exchanging keys securely
10. Which algorithm is based on the difficulty of factoring large prime numbers?
a) DES
b) RC5
c) RSA
d) Blowfish
Answer: c) RSA
11. IDEA algorithm uses a key size of:
a) 56 bits
b) 64 bits
c) 128 bits
d) 192 bits
Answer: c) 128 bits
12. Which algorithm is based on modular exponentiation and discrete logarithm
problem?
a) RSA
b) Elgamal
c) DES
d) RC4
Answer: b) Elgamal
13. Knapsack algorithm is based on:
a) Factorization problem
b) Discrete logarithm problem
c) Subset sum problem
d) Permutation problem
Answer: c) Subset sum problem
14. AES is also known as:
a) Rijndael
b) RC5
c) IDEA
d) Blowfish
Answer: a) Rijndael
15. Which algorithm is widely used in SSL for key exchange?
a) DES
b) RC4
c) Diffie-Hellman
d) Blowfish
Answer: c) Diffie-Hellman
16. Which of the following is a block cipher?
a) RC4
b) DES
c) Vigenère cipher
d) Vernam cipher
Answer: b) DES
17. What is the key size of DES?
a) 64 bits
b) 56 bits
c) 128 bits
d) 192 bits
Answer: b) 56 bits
18. AES algorithm was developed as:
a) RC4
b) Rijndael
c) Blowfish
d) IDEA
Answer: b) Rijndael
19. Which algorithm has a variable key size up to 448 bits?
a) AES
b) Blowfish
c) DES
d) RC5
Answer: b) Blowfish
20. Which cipher is a stream cipher?
a) RC4
b) AES
c) DES
d) Blowfish
Answer: a) RC4
21. RC5 uses:
a) Fixed key size
b) Fixed number of rounds
c) Variable key size and number of rounds
d) Stream cipher technique
Answer: c) Variable key size and number of rounds
22. IDEA algorithm uses a key size of:
a) 64 bits
b) 56 bits
c) 128 bits
d) 192 bits
Answer: c) 128 bits
23. Which of the following is not a symmetric key cipher?
a) DES
b) AES
c) RSA
d) RC5
Answer: c) RSA
24. Which public key cryptosystem is based on factorization of large prime
numbers?
a) DES
b) RC4
c) RSA
d) Blowfish
Answer: c) RSA
25. Diffie-Hellman algorithm is used for:
a) Encryption
b) Digital signature
c) Key exchange
d) Hashing
Answer: c) Key exchange
26. Elgamal cryptography is based on:
a) Factorization problem
b) Subset sum problem
c) Discrete logarithm problem
d) Permutation problem
Answer: c) Discrete logarithm problem
27. Knapsack algorithm is based on:
a) Discrete logarithm problem
b) Subset sum problem
c) Factorization problem
d) Permutation problem
Answer: b) Subset sum problem
28. Which of the following is a block cipher operation mode?
a) CFB
b) RC4
c) Vigenère
d) Vernam
Answer: a) CFB
29. The block size of AES is:
a) 56 bits
b) 64 bits
c) 128 bits
d) 192 bits
Answer: c) 128 bits
30. RSA is an example of:
a) Symmetric key algorithm
b) Stream cipher
c) Block cipher
d) Asymmetric key algorithm
Answer: d) Asymmetric key algorithm
UNIT-II: Fill in the Blanks
1. DES uses a key size of 56 bits for encryption.
2. Blowfish algorithm supports variable key sizes up to 448 bits.
3. RC4 is an example of a stream cipher.
4. AES has a fixed block size of 128 bits.
5. RSA algorithm is an example of asymmetric key cryptography.
6. In Diffie-Hellman key exchange, two parties securely exchange keys.
7. IDEA algorithm uses a key size of 128 bits.
8. Block ciphers encrypt data in fixed-size blocks.
9. Stream ciphers encrypt data one bit or byte at a time.
10. RC5 algorithm uses variable block sizes, key sizes, and number of rounds.
11. Elgamal cryptography is based on discrete logarithms.
12. Knapsack algorithm is based on the subset sum problem.
13. AES algorithm was originally called Rijndael.
14. In RSA, the public key is used for encryption and private key for decryption.
15. DES operates on 64-bit blocks of data.
16. DES uses a key size of 56 bits for encryption.
17. AES algorithm was developed as Rijndael.
18. Blowfish supports key sizes up to 448 bits.
19. RC4 is an example of a stream cipher.
20. IDEA uses a key size of 128 bits.
21. RC5 has a variable block size, key size, and number of rounds.
22. Block ciphers encrypt data in fixed-size blocks.
23. Stream ciphers encrypt data bit by bit or byte by byte.
24. RSA algorithm is based on factorization of large primes.
25. Diffie-Hellman is used for key exchange.
26. Elgamal cryptography is based on discrete logarithms.
27. Knapsack algorithm is based on subset sum problem.
28. AES has a block size of 128 bits.
29. In RSA, encryption and decryption are done using public and private keys.
30. CFB is a mode of block cipher operation.
Descriptive Questions
1.Describe the Data Encryption Standard (DES) algorithm in detail. Include key size, number
of rounds, and the structure of the Feistel network.
2. Discuss the Advanced Encryption Standard (AES) algorithm with a neat diagram. Explain
its key sizes, rounds, and different transformation steps used during encryption and
decryption.
3. What is Blowfish cipher? Explain the design of Blowfish, its key features, and why it is
considered a secure block cipher.
4. Explain different modes of operation of block ciphers such as ECB, CBC, CFB, OFB, and
CTR. What are their use cases and comparative strengths/weaknesses?
5. Describe the RSA algorithm in detail. Explain key generation, encryption, and decryption
processes with an example. What are the security aspects and limitations of RSA?
6. Discuss the Diffie-Hellman Key Exchange algorithm. How does it allow two parties to
securely exchange keys over an insecure channel? Support your answer with an example.
7. What is the Knapsack cryptographic algorithm? Explain its working principle with an
example. Why is it no longer widely used in modern cryptographic systems?
8. Compare symmetric and asymmetric cryptographic techniques in terms of speed, key
management, security, and practical usage scenarios.
9. Explain RSA Algorithm with An Example?
10. Discuss the Diffie-Hellman Key Exchange algorithm with an Example?
UNIT-III
Multiple choice Questions
1. What is the main purpose of a cryptographic hash function?
a) Encryption
b) Key exchange
c) Data integrity
d) Digital signature only
Answer: c) Data integrity
2. Which of the following is a widely used hash function?
a) DES
b) SHA-512
c) RSA
d) RC4
Answer: b) SHA-512
3. What is the output size of SHA-512?
a) 128 bits
b) 256 bits
c) 384 bits
d) 512 bits
Answer: d) 512 bits
4. HMAC is used for:
a) Encryption
b) Hashing
c) Message authentication
d) Key generation
Answer: c) Message authentication
5. Which of the following is a message authentication code based on block ciphers?
a) HMAC
b) CMAC
c) SHA-512
d) RSA
Answer: b) CMAC
6. Digital signatures provide:
a) Confidentiality only
b) Integrity only
c) Authentication and non-repudiation
d) Encryption
Answer: c) Authentication and non-repudiation
7. Elgamal Digital Signature Scheme is based on:
a) Factorization problem
b) Subset sum problem
c) Discrete logarithm problem
d) Permutation problem
Answer: c) Discrete logarithm problem
8. Which of the following is a protocol for network authentication?
a) RSA
b) Kerberos
c) SHA-512
d) HMAC
Answer: b) Kerberos
9. X.509 is used for:
a) Generating keys
b) Message authentication
c) Digital certificates and authentication
d) Hashing data
Answer: c) Digital certificates and authentication
10. Public Key Infrastructure (PKI) is used for:
a) Data compression
b) Key management and distribution
c) Stream cipher generation
d) Symmetric key encryption
Answer: b) Key management and distribution
11. Kerberos uses:
a) Public key encryption only
b) Symmetric key encryption
c) Stream cipher
d) Asymmetric key encryption only
Answer: b) Symmetric key encryption
12. Which of the following provides confidentiality, integrity, and authenticity in
message communication?
a) Hash function
b) Message authentication code
c) Digital signature
d) Encryption
Answer: c) Digital signature
13. In HMAC, the underlying function used is:
a) Block cipher
b) Stream cipher
c) Hash function
d) Public key encryption
Answer: c) Hash function
14. Which service is used for distributing public keys securely?
a) Kerberos
b) X.509
c) SHA-512
d) HMAC
Answer: b) X.509
15. CMAC stands for:
a) Code-based Message Authentication Code
b) Cipher-based Message Authentication Code
c) Combined Message Authentication Code
d) Certified Message Authentication Code
Answer: b) Cipher-based Message Authentication Code
16. What is the main purpose of cryptographic hash functions?
a) Encryption
b) Decryption
c) Message integrity
d) Key generation
Answer: c) Message integrity
17. Which of the following is a property of hash functions?
a) Hash value is variable length
b) Easy to reverse
c) One-way and collision-resistant
d) Uses private keys
Answer: c) One-way and collision-resistant
18. What is the output size of SHA-512?
a) 128 bits
b) 256 bits
c) 384 bits
d) 512 bits
Answer: d) 512 bits
19. HMAC is used for:
a) Encryption
b) Hashing only
c) Message authentication
d) Key exchange
Answer: c) Message authentication
20. Which of the following is a message authentication code based on block ciphers?
a) HMAC
b) SHA-512
c) CMAC
d) RSA
Answer: c) CMAC
21. Digital signatures provide:
a) Confidentiality only
b) Authentication and non-repudiation
c) Encryption only
d) Hashing only
Answer: b) Authentication and non-repudiation
22. Elgamal Digital Signature Scheme is based on:
a) Factorization problem
b) Subset sum problem
c) Discrete logarithm problem
d) Permutation problem
Answer: c) Discrete logarithm problem
23. Which protocol is used for secure network authentication?
a) RSA
b) Kerberos
c) SHA-512
d) HMAC
Answer: b) Kerberos
24. X.509 standard is used for:
a) Hashing
b) Key generation
c) Digital certificates and authentication
d) Message encryption
Answer: c) Digital certificates and authentication
25. Public Key Infrastructure (PKI) provides:
a) Stream cipher generation
b) Key management and distribution
c) Data compression
d) Hashing services
Answer: b) Key management and distribution
26. Kerberos protocol uses:
a) Public key encryption
b) Symmetric key encryption
c) Stream cipher
d) Hashing only
Answer: b) Symmetric key encryption
27. In HMAC, the underlying function used is:
a) Block cipher
b) Stream cipher
c) Hash function
d) Public key encryption
Answer: c) Hash function
28. Which service distributes public keys securely?
a) Kerberos
b) X.509
c) SHA-512
d) CMAC
Answer: b) X.509
29. CMAC stands for:
a) Code-based Message Authentication Code
b) Cipher-based Message Authentication Code
c) Certified Message Authentication Code
d) Combined Message Authentication Code
Answer: b) Cipher-based Message Authentication Code
30. Which of the following ensures that the sender cannot deny the message sent?
a) Encryption
b) HMAC
c) Digital signature
d) Hash function
Answer: c) Digital signature