Ethical Hacking | Week 6

Course Name: Ethical Hacking

Course Link: Click Here

These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers


Q1. Which of the following statement is true for Masquerade attack?
a. In this attack, an attacker passively captures a transaction and its reply.
b. In this attack, some portion of message is altered on its way.
c. In this attack, an attacker prevents access of resource to its legitimate users.
d. In this attack, the attacker pretends as a legitimate entity.
e. In this attack, the attacker analyzes the network traffic.

Answer: d. In this attack, the attacker pretends as a legitimate entity.


Q2. Which of the following statement(s) is/are true?
a. In private key encryption, separate keys are used by sender and receiver.
b. In private key encryption, a single key is used by sender and receiver.
c. In public key encryption, separate keys are used by sender and receiver.
d. In public key encryption, a single key is used by sender and receiver.

Answer: b, c


These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers


Q3. Consider the following statement:
(i) In symmetric key cryptography, the security depends on secrecy of the key.
(ii) In symmetric key cryptography, the security depends on encryption/decryption algorithm.

a. Only (i) is true
b. Only (ii) is true
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.

Answer: a. Only (i) is true


Q4. 25 parties want to exchange messages securely. The number of distinct key required by a symmetric key encryption algorithm and public key encryption technique like RSA will be _____ and ____ respectively.
a. 25 and 50
b. 50 and 50
c. 100 and 50
d. 300 and 25
e. 300 and 50

Answer: e. 300 and 50


These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers


Q5. How will be the plaintext for the cipher text “LETTY CEIV” encrypted using a substitution cipher
approach, where each letter is replaced by the k-th next letter. (Assumption: (i) the alphabets
are wrapped around, i.e. Z is followed by A, (ii) each alphabets (A to Z) is assigned a number (1
to 26), (iii) the value of secrete key k is 4).

a. HAPPY YEAR
b. HAPPU YAER
c. HAPPY YEAR
d. None of this

Answer: b. HAPPU YAER


Q6. In data encryption standard (DES), longer plain text are processed in _______ bit blocks.

Answer: 64


These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers


Q7. The effective key lengths used in AES encryption algorithms can be:
a. 64 bit
b. 128 bit
c. 192 bit
d. 256 bit
e. 512bit

Answer: b, c, d


Q8. For decryption using public-key cryptography _______ is used.
a. Receivers public key
b. Receiver’s private key
c. Sender’s public key
d. Sender’s private key

Answer: b. Receiver’s private key


These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers


Q9. Which of the following statement(s) is/are true.
a. The security of RSA algorithm is dependent on prime factorization problem.
b. RSA algorithm is vulnerable to man-in-the middle attack.
c. Diffie-Hellman approach can be used for encryption/decryption of message.
d. Symmetric encryption approaches are faster than asymmetric encryption.
e. None of these.

Answer: a, d


Q10. Which of the following techniques cannot be used for message authentication?
a. Conventional encryption approach such as private key.
b. MD4
c. SHA-256
d. SHA-0
e. RIPEMD-128

Answer: d. SHA-0


These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers



These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers

More Solutions of Ethical Hacking: Click Here

More NPTEL Solutions: https://progiez.com/nptel-assignment-answers/


These are NPTEL Ethical Hacking Week 6 Assignment 6 Answers
The content uploaded on this website is for reference purposes only. Please do it yourself first.