Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
6 views4 pages

Tutorial Crypto

Uploaded by

INFO TEC
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views4 pages

Tutorial Crypto

Uploaded by

INFO TEC
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

TUTORIAL CRYPTO

SECTION A

MCQs: Choose the right answer from the proposed. (1×10


mrks)

1) Which of the following is a form of encryption based on the


characteristics of the smallest particles known?
o A. Quantum cryptography

o B. Algorithm errors

o C. Frequency analysis

o D. Brute-force attacks

2) What is the most popular version of X.509?


o A. Version 5

o B. Version 3

o C. Version 2

o D. Version 1

3) Which of the following is a statement that the CA uses to


issue certificates and implement the policies of the CA?
A. CTP B. CRL C. CPS
D. CNS
4) Which of the following is not one of the main types of trust
models used with PKI?
A. Hierarchical B. Bridge
C. Mesh D. Star

5) Which of the following is based on the idea of using large


integer numbers for the basis of asymmetric encryption?
A. ECC B. Diffie-Hellman C. El Gamal
D. RSA

6) Which of the following is a 64-bit block cipher?


A. IDEA B. CAST C. Blowfish
D. RC5
7) In which PKI trust model does a root CA at the top provide all
the information to intermediate CAs?
A. Hierarchical B. Bridge C. Mesh
D. Hybrid

8) Which of the following occur when predictable results create


a weakness in the coding system?
A. Quantum cryptography B. Algorithm errors

C. Frequency analysis D. Brute-force


attacks

9) Which of the following is a list of which certificates are being


revoked?
A. CTP B. CRL C. CPS
D. CNS

10) What is the process of hiding text within an image


called?
A. Steganography B. Encryption

C. Spyware D. Keystroke logging

SECTION B- QUESTIONS ANSWERS (60 MARKS)


1. Define SSH and Open SSH (2 mrks)
2. Give the 6 most important tasks to secure your SSH server setup (6mrks)
3. What is Email Certificate? Give the importance of S/MIME certificates
(3mrks)
4. Explain the AES encryption procedure (3mrks)
5. Give the criteria for choosing a Digital certificate for your environment
(4mrks)
6. Give 3 main types of digital certificates (3 mrks)
7. How does SSL certificate works? (3mrks)
8. How does certificate revocation list work? (3mrks)
9. Construct a table for the Playfair Cipher with the keyword
EFFECTIVENESS? (5mrks)
10. Encrypt the phrase: “EXAMFORINFORMATIONSECURITY” (5mrks)
11. Decrypt the sequence: “PQFVCKFUFBGMUFYSTIKZKAGWWG”
(5mrks)
12.Explain SSL Encryption and give the steps for establishing an SSL
connection
13.What is the difference between IDS and IPS?
14.Explain SSL and TLS
15. Explain MITM attack and how to prevent it?
16. Explain DDOS attack and how to prevent it?
17.Give the step by step E-commerce website security measures to cover
you 24/7
18.Now consider a slightly modified situation where you are confident
that your browser has not been tampered with, but you are concerned
that your operating system may have been compromised.
You type https://secrets.cs.berkeley.edu into the browser’s address
bar, and your browser establishes a TLS connection to
https://secrets.cs.berkeley.edu. That web server responds with a Web
form for you to type in your username and password, and your
browser sends back your answers via TLS.
Can malware running inside the operating system extract your
username and password? Justify your answer.
(i) Yes. (ii) No.

19. Vigenere Cipher using the table provided below


a) Encrypt the following Message: "What fools these mortals be" Keyword:
‘Puck’ (4 mrks)
b) suppose you received the following encrypted message:
JTLOM FJRCS XM If the receiver uses the keyword ‘hfikeniaoitz’ what message
would be received? (4 mrks)

You might also like