Ethical Hacking | Week 6
Course Name: Ethical Hacking
Course Link: Click Here
These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers
Q1. Which of the following statement is true for Masquerade attack?
a. In this attack, an attacker passively captures a transaction and its reply.
b. In this attack, some portion of message is altered on its way.
c. In this attack, an attacker prevents access of resource to its legitimate users.
d. In this attack, the attacker pretends as a legitimate entity.
e. In this attack, the attacker analyzes the network traffic.
Answer: d. In this attack, the attacker pretends as a legitimate entity.
Q2. Which of the following statement(s) is/are true?
a. In private key encryption, separate keys are used by sender and receiver.
b. In private key encryption, a single key is used by sender and receiver.
c. In public key encryption, separate keys are used by sender and receiver.
d. In public key encryption, a single key is used by sender and receiver.
Answer: b, c
These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers
Q3. Consider the following statement:
(i) In symmetric key cryptography, the security depends on secrecy of the key.
(ii) In symmetric key cryptography, the security depends on encryption/decryption algorithm.
a. Only (i) is true
b. Only (ii) is true
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.
Answer: a. Only (i) is true
Q4. 25 parties want to exchange messages securely. The number of distinct key required by a symmetric key encryption algorithm and public key encryption technique like RSA will be _____ and ____ respectively.
a. 25 and 50
b. 50 and 50
c. 100 and 50
d. 300 and 25
e. 300 and 50
Answer: e. 300 and 50
These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers
Q5. How will be the plaintext for the cipher text “LETTY CEIV” encrypted using a substitution cipher
approach, where each letter is replaced by the k-th next letter. (Assumption: (i) the alphabets
are wrapped around, i.e. Z is followed by A, (ii) each alphabets (A to Z) is assigned a number (1
to 26), (iii) the value of secrete key k is 4).
a. HAPPY YEAR
b. HAPPU YAER
c. HAPPY YEAR
d. None of this
Answer: b. HAPPU YAER
Q6. In data encryption standard (DES), longer plain text are processed in _______ bit blocks.
Answer: 64
These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers
Q7. The effective key lengths used in AES encryption algorithms can be:
a. 64 bit
b. 128 bit
c. 192 bit
d. 256 bit
e. 512bit
Answer: b, c, d
Q8. For decryption using public-key cryptography _______ is used.
a. Receivers public key
b. Receiver’s private key
c. Sender’s public key
d. Sender’s private key
Answer: b. Receiver’s private key
These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers
Q9. Which of the following statement(s) is/are true.
a. The security of RSA algorithm is dependent on prime factorization problem.
b. RSA algorithm is vulnerable to man-in-the middle attack.
c. Diffie-Hellman approach can be used for encryption/decryption of message.
d. Symmetric encryption approaches are faster than asymmetric encryption.
e. None of these.
Answer: a, d
Q10. Which of the following techniques cannot be used for message authentication?
a. Conventional encryption approach such as private key.
b. MD4
c. SHA-256
d. SHA-0
e. RIPEMD-128
Answer: d. SHA-0
These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers
These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers
More Solutions of Ethical Hacking: Click Here
More NPTEL Solutions: https://progiez.com/nptel/

This content is uploaded for study, general information, and reference purpose only.