NPTEL Ethical Hacking Week 6 Assignment Answers 2024

Sanket
By Sanket

NPTEL Ethical Hacking Week 6 Assignment Answers 2024

1. Which of the following statements is true for Masquerade attack?

a. In this attack, some portion of message is altered on its way.
b. In this attack, an attacker prevents access of resource to its legitimate users.
c. In this attack, the attacker pretends as a legitimate entity.
d. In this attack, the attacker analyzes the network traffic.

Answer :- For Answers Click Here 

2. Which of the following is an example of passive security attack?

a. Traffic analysis
b. Replay
c. Modification
d. Denial of Service
e. None of these

Answer :- For Answers Click Here 

3. Which of the following statement(s) is/are true?

a. In symmetric key cryptography, separate keys are used by sender and receiver.
b. In symmetric key cryptography, a single key is used by sender and receiver.
c. In asymmetric key cryptography, separate keys are used by sender and receiver.
d. In asymmetric key cryptography, a single key is used by sender and receiver.

Answer :- For Answers Click Here 

4. Consider the following statement:
(i) In symmetric key cryptography, the security depends on secrecy of the key.
(ii) In symmetric key cryptography, the security depends on the secrecy of the
encryption/decryption algorithm.

a. Only (i) is true
b. Only (ii) is true
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.

Answer :- 

5. 25 parties want to exchange messages securely using a private key encryption algorithm. The
number of distinct key values required will be______________.

Answer :- 

6. Consider a cipher text “GVCTXSKVETLC” encrypted using a substitution cipher approach, where
each letter is replaced by the k-th next letter.
Assumption:
(i) The alphabets are wrapped around, i.e. Z is followed by A.
(ii) Each alphabet (A to Z) is assigned a number (1 to 26).
(iii) The value of secret key k is 4.
What will be the plain text?

a. HAPPYNEWYEAR
b. CRYPTOGRAPHY
c. SECURENETWOR
d. CRYPTOGRAPHIC
e. None of these.

Answer :- For Answers Click Here 

7. Consider a mono-alphabetic cipher with the following key value:
(ABWXEFSTIJOPMNKLQRGHUVCDYZ)
What will be the encrypted form of the message “ALPHABETIC” ?

a. APLTABEHIW
b. ALPHABETIC
c. WXLTABEHIC
d. None of these.

Answer :- 

8. If a sender A wants to carry out encryption on a message and send it to receiver B using public-key cryptography. Which of the following key will be used for decryption at receiver end B?

a. A’s public key
b. A’s private key
c. B’s public key
d. B’s private key

Answer :- 

9. The effective key length use in AS encryption algorithm can be:

a. 64 bit
b. 128 bit
c. 192 bit
d. 256 bit
e. 513 bit.

Answer :- 

10. 50 parties want to exchange messages securely using some public key encryption technique like
RSA. The number of distinct key values required will be_______________.

Answer :- For Answers Click Here 
Share This Article
Leave a comment