Self Studies

Computer Networks Test 7

Result Self Studies

Computer Networks Test 7
  • Score

    -

    out of -
  • Rank

    -

    out of -
TIME Taken - -
Self Studies

SHARING IS CARING

If our Website helped you a little, then kindly spread our voice using Social Networks. Spread our word to your readers, friends, teachers, students & all those close ones who deserve to know what you know now.

Self Studies Self Studies
Weekly Quiz Competition
  • Question 1
    1 / -0
    Let P be the plaintext, k be the key, Ek be the function to encrypt the plaintext and Dk be the function to decrypt the ciphertext. What is valid function to get the plain text?
    Solution

    Let C be ciphertext then Encrypted message (C)= Ek(P)

    Decrypted message(P) = Dk(C)

    ∴ P = Dk(Ek(P))
  • Question 2
    1 / -0

    Which of the following are used to generate a message digest by the network security

    protocols?

    P) SHA-256

    Q) AES

    R) DES

    S) MD5

    Solution

    SHA-256 and MD5 both generate the message digest.

    1. SHA-256 is novel hash functions computed with 32-bit words.
    2. MD5 –MD5 is a widely used cryptographic hash function that produces a 128-bit hash value.


    Therefore option 1 is correct.

    Important Point:

    RSA and DES both are encryption algorithms.

    • RSA is also used to decrypt the encrypted message by the same RSA algorithm.
    • Data encryption standard (DES) is a block cipher that encrypts data in blocks of size 64 bits each. That is 64 bits of plain text goes input to the DES which produces 64 bit of ciphertext. The key length is 56 bits.
    • RSA and SHA- 256 do not allow generating message digests.
  • Question 3
    1 / -0

    Match the terms with the definition.

    a) masquerading                    i) session is intercepted

    b) Phishing                             ii) one pretends to be someone else

    c) Hijacking                            iii) a email misleads a user into entering confidential information

    Solution

    Masquerading:

    Masquerade means disguise. In terms of communication security, it is a type of attack where attacker pretends to be someone else (or we can say that pretends to be an authorized user of a system ) in order to gain access to the system.  Most common is OS masquerading. Masquerading will be done by using stolen ID and passwords.

    Phishing:

    In phishing, attacker set up fake websites, which look like real websites. It uses email to mislead a user into entering confidential information. In this, attacker decides to create her own website.  The attacker exploits the email system to suggest that the sender of the email is some authorized person. When customer clicks on the URL specified in email, he/she is taken to the attacker’s site.

    Hijacking:

    In this, attacker somehow manages to impersonate a legitimate user. For this to be possible, the attacker taps into electronic i.e. computer based conversation between two genuine users , servers or their combinations. Then attacker poses as one of the users and tries to fool the other side.
  • Question 4
    1 / -0

    If the total relative prime number for integer n from 1 to n is y and n is 23552 then the value of y is _____? 

    Solution

    Concept:

    Euler's Totient function counts the positive integers up to a given integer n that are relatively prime to n. It is written using the Greek letter phi as φ(n) or ϕ(n) and may also be called Euler's phi function.

    Explanation:

    ϕ(n) = ϕ(23552)

    = ϕ (1024 × 23)

    = ϕ(1024) × ϕ(23)

    = ϕ(210) × ϕ(23)

    Since 23 is prime

    ϕ(17) = 23 – 1 = 22

    Since 2 is prime

    ϕ(24) = 1024 × (1 –  ½ ) = 512

    ϕ(272) = 512 × 22 = 11264

  • Question 5
    1 / -0

    Consider the following statement.

    I. Packet Filter Firewall analyze network traffic at transport layer.

    II. Circuit Level Firewall operate at transport and session layer of OSI Model.

    From the above statement which statement/s is/are True
    Solution

    Concept

    Packet filtering firewalls:

    • As the most “basic” and oldest type of firewall architecture, packet-filtering firewalls create a checkpoint at a traffic router or switch.
    • These work at the Network layer of the OSI networking model.
    • The firewall performs a simple check of the data packets coming through the router—inspecting information such as the destination and origination IP address, packet type, port number, and other surface-level information without opening up the packet to inspect its contents.

    Circuit-Level Gateways

    • This simplistic firewall type is meant to quickly and easily approve or deny traffic without consuming significant computing resources, circuit-level gateways work by verifying the transmission control protocol (TCP) handshake.
    • These work at the session layer of the OSI model. These are also assumed to be working as a "shim-layer" between the application layer and the transport layer of the TCP/IP stack.
    • This TCP handshake check is designed to make sure that the session the packet is from is legitimate.
  • Question 6
    1 / -0

    Consider an RSA cryptosystem, a participant A uses two prime numbers p and q where p × q = 1247 to generate his public and private keys. The public key of A is e and the private key is d. The value of the public key is 11. The value of the private key d is _____.

    Solution

    Concept:

    RSA is one of the first public-key cryptosystems and is widely used for secure data transmission.

    Data:

    Public Key = (n,e) Private Key = (n,d)

    e = 19, d = ? 

    ϕ(n) = ϕ(1247)  

    Calculation:

    ϕ(1247) = ϕ(29 × 43) = 28 × 42 = 1176

    e × d ≡ 1 mod (ϕ)

    11 × d ≡  1 mod (1176)

    (11 × 107) mod 1176 ≡ 1

    ∴ d = 107 

  • Question 7
    1 / -0

    Which of the following statements are true?

    I. An asymmetric key cryptosystem uses the private and public keys of the receiver

    II. A digital signature uses the private and public keys of the sender.

    III. Symmetric-key cryptosystems are very inefficient when dealing with long messages.
    Solution

    A digital signature needs a public-key system. The signer signs with his/her private key and the verifier verifies with the signer’s public key.

    In cryptosystem the sender uses the public key of the receiver to encrypt; the receiver uses his own private key to decrypt.

    Asymmetric-key cryptosystems are very inefficient when dealing with long messages. The solution is to sign a digest of the message, which is much shorter than the message.
  • Question 8
    1 / -0
    The value of the expression (353 mod 7) in the range 0 to 7 is _____.
    Solution

    3 mod 7 = 3

    9 mod 7 = 2

    27 mod 7 = 6

    81 mod 7 = 4

    243 mod 7 = 5

    729 mod 7 = 1

    2187 mod 7 = 3

    6561 mod 7 = 2 and so on

    353 mod 7 = (36 × 8 +5 ) mod 7 ≅ 35 mod 7 = 5

    The value of (353 mod 7)  is 5

  • Question 9
    1 / -0

    Consider a cyber cafe in which 51 systems are present. All 51 systems want to communicate with each other using symmetric key cryptographic system and the communication should not be decoded by others apart from two systems who are communicating. What is the number of keys required for the systems as a whole to satisfy confidentiality?

    Solution

    Concept:

    In symmetric key cryptographic system, every pair of nodes need a separate key.

    Hence, there are nC2 pairs are required for n system.

    Formula:

     nC2  = \(\frac{n(n-1)}{2}\)

    Calculation:

    51C2  = \(\frac{51(51-1)}{2} = 1275\)

Self Studies
User
Question Analysis
  • Correct -

  • Wrong -

  • Skipped -

My Perfomance
  • Score

    -

    out of -
  • Rank

    -

    out of -
Re-Attempt Weekly Quiz Competition
Selfstudy
Selfstudy
Self Studies Get latest Exam Updates
& Study Material Alerts!
No, Thanks
Self Studies
Click on Allow to receive notifications
Allow Notification
Self Studies
Self Studies Self Studies
To enable notifications follow this 2 steps:
  • First Click on Secure Icon Self Studies
  • Second click on the toggle icon
Allow Notification
Get latest Exam Updates & FREE Study Material Alerts!
Self Studies ×
Open Now