Top 150+ Solved Information and Network Security MCQ Questions Answer
Q. There is an addition of round key before the start of the AES round algorithms.
a. True
b. False
c. none
d. all
Q. On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?
a. Permutation P
b. Swapping of halves
c. XOR of subkey with function f
d. F function
Q. What is the block size in the Simplified AES algorithm?
a. 36 bits
b. 16 bits
c. 40 bits
d. 8 bits
Q. What is the key size in the S-AES algorithm?
a. 32 bits
b. 24 bits
c. 16 bits
d. None of the mentioned
Q. Which of the following is a faulty S-AES step function?
a. Mix Columns
b. Add round key
c. Byte substitution
d. Shift rows
Q. How many step function do Round 1 and 2 each have in S-AES?
a. 1 and 4
b. 3 and 4
c. Both 4
d. 4 and 3
Q. The inverse transformation matrix times the forward transformation matrix equals the identity matrix.
a. True
b. False
c. none
d. all
Q. DES follows_________.
a. SP Networks
b. Feistel Cipher Structure
c. Caesars Cipher
d. Hash Algorithm
Q. In the DES algorithm the round key is __________ bit and the Round Input is ____________bits.
a. 48, 32
b. 32, 32
c. 56, 24
d. 64,32
Q. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via____________.
a. Addition of ones
b. Addition of zeros
c. Duplication of the existing bits
d. Scaling of the existing bits