Top 150+ Solved Information and Network Security MCQ Questions Answer

From 76 to 90 of 106

Q. On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?

a. Permutation P

b. Swapping of halves

c. XOR of subkey with function f

d. F function

  • b. Swapping of halves

Q. What is the block size in the Simplified AES algorithm?

a. 36 bits

b. 16 bits

c. 40 bits

d. 8 bits

  • c. 40 bits

Q. What is the key size in the S-AES algorithm?

a. 32 bits

b. 24 bits

c. 16 bits

d. None of the mentioned

  • c. 16 bits

Q. Which of the following is a faulty S-AES step function?

a. Mix Columns

b. Add round key

c. Byte substitution

d. Shift rows

  • c. Byte substitution

Q. How many step function do Round 1 and 2 each have in S-AES?

a. 1 and 4

b. 3 and 4

c. Both 4

d. 4 and 3

  • d. 4 and 3

Q. DES follows_________.

a. SP Networks

b. Feistel Cipher Structure

c. Caesars Cipher

d. Hash Algorithm

  • b. Feistel Cipher Structure

Q. The DES algorithm has a key length of ______.

a. 16 Bits

b. 32 Bits

c. 64 Bits

d. 128 Bits

  • c. 64 Bits

Q. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via____________.

a. Addition of ones

b. Addition of zeros

c. Duplication of the existing bits

d. Scaling of the existing bits

  • d. Scaling of the existing bits

Q. The Initial Permutation table/matrix is of size _____.

a. 4×8

b. 8×8

c. 12×8

d. 16×8

  • b. 8×8
Subscribe Now

Get All Updates & News