15 May 2026

computer networks part -4

Question: GCD is used to:
Options:
(A) Encrypt data
(B) Find key relationships
(C) Compress data
(D) Route packets
Correct Answer: (B) Find key relationships

Question: Modular inverse is essential for:
Options:
(A) Decryption process
(B) Routing tables
(C) Hashing only
(D) Data storage
Correct Answer: (A) Decryption process


Question: Euler's totient function helps in:
Options:
(A) Addressing
(B) Key generation
(C) Data transfer
(D) Routing
Correct Answer: (B) Key generation


Question: Fermat's theorem contributes to:
Options:
(A) Network speed
(B) Cryptographic hardness
(C) Storage efficiency
(D) Compression
Correct Answer: (B) Cryptographic hardness

Question: Computational complexity resists:
Options:
(A) Routing loops
(B) Brute-force attacks
(C) Packet loss
(D) Latency
Correct Answer: (B) Brute-force attacks

Question: Exponentiation is heavily used in:
Options:
(A) Symmetric encryption
(B) Asymmetric encryption
(C) Routing
(D) Switching
Correct Answer: (B) Asymmetric encryption

Question: Cryptographic strength depends on:
Options:
(A) Key secrecy only
(B) Mathematical difficulty
(C) Bandwidth
(D) CPU speed
Correct Answer: (B) Mathematical difficulty

Question: Modular reduction prevents:
Options:
(A) Overflow
(B) Encryption
(C) Hashing
(D) Routing
Correct Answer: (A) Overflow


Question: Public key systems rely on:
Options:
(A) Simple arithmetic
(B) Complex number theory
(C) Analog math
(D) Linear algebra only
Correct Answer: (B) Complex number theory


Question: Arithmetic operations in cryptography are:
Options:
(A) Random
(B) Deterministic
(C) Analog
(D) Approximate
Correct Answer: (B) Deterministic


Question: Which is NOT an encryption arithmetic operation?
Options:
(A) Modular multiplication
(B) XOR
(C) Routing update
(D) Exponentiation
Correct Answer: (C) Routing update


Question: One-way functions are important because they are:
Options:
(A) Easily reversible
(B) Hard to invert
(C) Random
(D) Inefficient
Correct Answer: (B) Hard to invert


Question: Cryptanalysis targets:
Options:
(A) Arithmetic weakness
(B) Routing tables
(C) Network speed
(D) Storage
Correct Answer: (A) Arithmetic weakness


Question: Encryption arithmetic operates under:
Options:
(A) Open sets
(B) Finite fields
(C) Infinite sets
(D) Analog values
Correct Answer: (B) Finite fields


Question: Which math concept ensures uniqueness in keys?
Options:
(A) Hashing
(B) Prime factorization
(C) Compression
(D) Switching
Correct Answer: (B) Prime factorization


Question: Public key encryption relies on difficulty of:
Options:
(A) Sorting
(B) Factoring large numbers
(C) Addition
(D) Subtraction
Correct Answer: (B) Factoring large numbers


Question: Arithmetic complexity increases with:
Options:
(A) Smaller keys
(B) Larger key sizes
(C) Lower bandwidth
(D) Fewer users
Correct Answer: (B) Larger key sizes


Question: Symmetric encryption uses:
Options:
(A) Two unrelated keys
(B) One shared secret key
(C) Public key only
(D) Digital certificates
Correct Answer: (B) One shared secret key


Question: Symmetric algorithms are known for:
Options:
(A) High computational cost
(B) Efficiency and speed
(C) Key exchange complexity
(D) Non-repudiation
Correct Answer: (B) Efficiency and speed


Question: AES is preferred because it is:
Options:
(A) Slow
(B) Strong and efficient
(C) Obsolete
(D) Hardware-only
Correct Answer: (B) Strong and efficient


Question: DES is considered insecure due to:
Options:
(A) Large key size
(B) Small key size
(C) High speed
(D) Public key usage
Correct Answer: (B) Small key size

Question: Blowfish is a:
Options:
(A) Stream cipher
(B) Block cipher
(C) Hash function
(D) Routing protocol
Correct Answer: (B) Block cipher

Anic_an_engineer

Author & Editor

Has laoreet percipitur ad. Vide interesset in mei, no his legimus verterem. Et nostrum imperdiet appellantur usu, mnesarchum referrentur id vim.

0 comments:

Post a Comment

 
biz.