A message “COMPUTERNETWORK” encrypted(ignore quotes)using columnar transposition cipher with a key “LAYER”. The encrypted message is: (A) CTTOEWMROPNRUEK (B) MROUEKCTTPNROEW (C) OEWPNRCTTUEKMRO (D) UEKPNRMROOEWCTT

1 Answer

Answer :

(C) OEWPNRCTTUEKMRO

Related questions

Description : Encrypt the plain text Message “EXTRANET” using Transposition cipher technique with the following key: Using ‘Z’ as bogus character. (A) TAXERTZENZ (B) EXTRANETZZ (C) EZXZTRZANZET (D) EXTZRANZETZ

Last Answer : (A) TAXERTZENZ 

Description : The Caesar cipher is a _______cipher that has a key of 3. A. transposition B. killer C. shift D. none of the above

Last Answer : C. shift

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : Encrypted data is referred as cipher text. -Technology

Last Answer : TrueEncrypted data is presented in coded form. So, it is known as cipher text.

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : A) SSL handshake protocol

Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv  

Last Answer : a. i and ii

Description : In public key encryption if A wants to send an encrypted message a. A encrypts message using his private key b. A encrypts message using B’s private key c. A encrypts message using B’s public key d. A encrypts message using his public key  

Last Answer : c. A encrypts message using B’s public key 

Description : Using data p=3, q=11, n=pq, d=7 in RSA algorithm find the cipher text of the given plain text SUZANNE (A) BUTAEEZ (B) SUZANNE (C) XYZABCD (D) ABCDXYZ

Last Answer : (A) BUTAEEZ

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : In SET protocol a customer sends a purchase order a. encrypted with his public key b. in plain text form c. encrypted using Bank’s public key d. using digital Signature system

Last Answer : d. using digital Signature system 

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : The data unit in the TCP/IP layer called a ..... A) Message B) Segment C) Datagram D) Frame

Last Answer : D) Frame

Description : My 11 year old sister says lit all the time and bothers me with rubbish drawings and stupid quotes. I can't ignore her.?

Last Answer : First of all, why don't you go out somewhere to avoid her? Try to hangout more with your friends and stay away from her the most. Also, I think she just need some attention, so why don't you go to ... think of is to bribe her. Tell her that you're going to give her something she likes if she stops.

Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv

Last Answer : b. i, ii, iii 

Description : A digital signature is a. a bit string giving identity of a correspondent b. a unique identification of a sender c. an authentication of an electronic record by tying it uniquely to a key only a sender knows d. an encrypted signature of a sender 

Last Answer : c. an authentication of an electronic record by tying it uniquely to a key only a sender knows

Description : The message 11001001 is to be transmitted using the CRC polynomial x3+1 to protect it from errors. The message that should be transmitted is (A) 110010011001 (B) 11001001 (C) 110010011001001 (D) 11001001011

Last Answer : (D) 11001001011

Description : On dating sites, would you rather someone message you back saying "No, thanks" or just ignore your message?

Last Answer : Give them a “No, thanks” and add some tips with it. Maybe they’ll get something from it.

Description : Suppose d = { john :40, peter :45}, what happens when we try to retrieve a value using the expression d[ susan ]? a) Since susan is not a value in the set, Python raises a KeyError ... Python raises a KeyError exception d) Since susan is not a key in the set, Python raises a syntax error

Last Answer : c) Since “susan” is not a key in the set, Python raises a KeyError exception

Description : Using the RSA public key crypto system, if p=13, q=31 and d=7, then the value of e is (A) 101 (B) 105 (C) 103 (D) 107

Last Answer : (C) 103 Explanation: Basic RSA Algorithm: 1. Choose two primes, p & q. 2. Compute n=p*q and z=(p-1)*(q-1). 3. Choose a number relatively prime to z and call it d. 4. Find e such that e*d= ... each of these in turn by 7 to see which is divisible by 7, we find that 721/7 = 103, hence e = 103. 

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B.Steganogrhy. C.Liveanalysis D. Hashing

Last Answer : B.Steganogrhy.

Description : One of the problems with using SET protocol is a. the merchant's risk is high as he accepts encrypted credit card b. the credit card company should check digital signature c. the bank has to ... of all customers d. the bank has to keep a database of digital signatures of all customers 

Last Answer : c. the bank has to keep a database of the public keys of all customers

Description : Using what, data hiding in encrypted images be carried out in digital forensics? A. Acquisition. B. Steganography. C. Live analysis D. Hashing

Last Answer : B. Steganography. 

Description : What is transposition ?

Last Answer : Answer : In order to restore the balance of the unbalanced three phase line of unequal distance, interchangeable space is arranged between each wire at regular intervals. This type of transmission in a transmission line is called transposition.

Description : Why is line transposition done ?

Last Answer : The average inductance value of each line is found to be equal when transposed.

Description : Substitution of a thymine base by adenine in DNA is known as ((A) Transposition (B) Transition (C) Transversion (D) Frameshift mutation

Last Answer : Answer : C

Description : Substitution of an adenine base by guanine in DNA is known as (A) Transposition (B) Transition (C) Transversion (D) Frameshift mutation

Last Answer : Answer : B

Description : A newborn was diagnosed as having a congenital abnormality that resulted in transposition of her great arteries. While preparing the infant for surgery, the medical team needed to keep the ductus arteriosus ... by infusing (a) Cortisol (b) Indomethacin (c) Ketorolac (d) Misoprostol (e) Tacrolimus

Last Answer : Ans: D

Description : Which function is used to calculate the feasibility of whole game tree? a) Evaluation function b) Transposition c) Alpha-beta pruning d) All of the mentioned

Last Answer : a) Evaluation function

Description : What is called as transposition table? a) Hash table of next seen positions b) Hash table of previously seen positions c) Next value in the search d) None of the mentioned

Last Answer : b) Hash table of previously seen positions

Description : What is Transposition rule? a) From P → Q, infer ~Q → P b) From P → Q, infer Q → ~P c) From P → Q, infer Q → P d) From P → Q, infer ~Q → ~P

Last Answer : d) From P → Q, infer ~Q → ~P

Description : reasons the transposition of conductor

Last Answer : Following reasons the transposition of conductor:  1. Due transposition of conductor inductance of each line is same LA = LB = LC, So drop due to inductive reactance in each line is same so ... interferences are less due to transposition.  Figure of transposition of conductor: 

Description : Transposition -of the-transmission line is done to reduce : - a) line losses b) capacitive -effect  c) disturbance to nearby communication circuits d) effect of surge voltages induced on the line

Last Answer : Transposition -of the-transmission line is done to reduce : - disturbance to nearby communication circuits

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii ... and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : ........ is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : D) Internet Control Message Protocol (ICMP)

Description : In RSA algorithm,if p=5,q=7,e=7and message=3. What will be the value of ciphertext ?

Last Answer : 17

Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical

Last Answer : (A) Port 

Description : In a binary Hamming code the number of check digits is r then number of message digits is equal to: (A) 2r-1 (B) 2r-r-1 (C) 2r-r+1 (D) 2r+r-1

Last Answer : (B) 2r-r-1

Description : Which of the following is not valid with reference to Message Passing Interface (MPI)? (A) MPI can run on any hardware platform (B) The programming model is a distributed memory model. (C) All ... implicit. (D) MPI - Comm - Size returns the total number of MPI processes in specified communication.

Last Answer : (C) All parallelism is implicit.

Description : Which of the following statements is incorrect for Parallel Virtual Machine (PVM)? (A) The PVM Communication model provides asynchronous blocking send, asynchronous blocking receive and non-blocking receive function. ... of such messages. (D) In PVM Model, the message order is not preserved. 

Last Answer : (D) In PVM Model, the message order is not preserved.

Description : The distributed system is a collection of (P) and communication is achieved in distributed system by (Q) , where (P) and (Q) are : (A) Loosely coupled hardware on tightly ... message passing ,respectively. (D) Loosely coupled software on tightly coupled hardware and file sharing, respectively.

Last Answer : (C) Tightly coupled software on loosely coupled hardware and message passing ,respectively. 

Description : A Multicomputer with 256 CPUs is organized as 16x16 grid. What is the worst case delay (in hops) that a message might have to take? (A) 16 (B) 15 (C) 32 (D) 30

Last Answer : (D) 30

Description : In a packet switching network, if the message size is 48 bytes and each packet contains a header of 3 bytes. If 24 packets are required to transmit the message, the packet size is ................ (1) 2 bytes (2) 1 byte (3) 4 bytes (4) 5 bytes

Last Answer : (4) 5 bytes 

Description : What is a good hand cipher?

Last Answer : Here are descriptions of relatively simple hand ciphers. I’m not sure what exactly you want to encode or why but these seem to be a good place to start. You can use any of the as is, or one or more can be modified to varying degrees to create your own cipher.

Description : Can somebody help me solve this cipher?

Last Answer : I’m really puzzled, and don’t see the purpose in translating white noise into anything meaningful. There is nothing there. It’s just static. In the bottom example I began to see a skeleton face in the pixels, but that’s only because my mind took me there, and not because of any hidden image.

Description : What is cipher text ?

Last Answer : The next encrypted message is cipher text , which is not readable by humans.