Okay, here are 30 questions based on the provided PDF, formatted as requested:

Cryptography_Introduction QUESTION: What is the Greek word from which “Cryptography” is derived, and what does it mean? OPTIONS: A) Kryptos, meaning “secure” B) Graphos, meaning “writing” C) Kryptos, meaning “hidden” D) Logos, meaning “study” ?? SOLUTION: C) Kryptos, meaning “hidden” (Page 4)

Cryptography_Introduction QUESTION: Cryptography primarily deals with: OPTIONS: A) Analyzing network traffic patterns. B) Constructing and analyzing protocols to prevent unauthorized access to private messages. C) Developing hardware for secure data storage. D) Creating firewalls to protect network perimeters. ?? SOLUTION: B) Constructing and analyzing protocols to prevent unauthorized access to private messages. (Page 4)

Course_Coverage QUESTION: Which unit in the course coverage deals with Modular Arithmetic, Group, Ring, and Field? OPTIONS: A) Unit 1 B) Unit 2 C) Unit 3 D) Unit 4 ?? SOLUTION: B) Unit 2 (Page 2)

Course_Coverage QUESTION: How many lecture hours are allocated to the topic of “Message authentication, Cryptographic hash algorithms, Digital Signatures”? OPTIONS: A) 5 B) 6 C) 7 D) 8 ?? SOLUTION: B) 6 (Page 2)

Course_Outcome QUESTION: Which of the following is NOT a stated course outcome? OPTIONS: A) Describe the fundamentals of networks security. B) Design new cryptographic hardware. C) Explain the different cryptographic operations of public key cryptography. D) Apply various Authentication schemes. ?? SOLUTION: B) Design new cryptographic hardware. (Page 3)

Cryptographic_Algorithms QUESTION: Cryptographic algorithms and protocols can be grouped into _____ main areas. Fill in the blank. OPTIONS: ?? SOLUTION: four (Page 5)

Cryptographic_Algorithms QUESTION: Symmetric encryption is used to conceal: OPTIONS: A) Small blocks of data only. B) Blocks or streams of data of any size. C) Only encryption keys. D) Only digital signatures. ?? SOLUTION: B) Blocks or streams of data of any size. (Page 5)

Cryptographic_Algorithms QUESTION: Asymmetric encryption is primarily used for concealing ______ blocks of data. OPTIONS: ?? SOLUTION: small (Page 5)

Security_Requirements QUESTION: List the five essential network and computer security requirements depicted in the pentagonal diagram. OPTIONS: ?? SOLUTION: Confidentiality, Integrity, Authenticity, Availability, Accountability (Page 6 & 7)

Security_Requirements QUESTION: __________ ensures timely and reliable access to and use of information. OPTIONS: ?? SOLUTION: Availability (Page 7)

Security_Requirements QUESTION: Guarding against improper information modification or destruction pertains to which security requirement? OPTIONS: A) Confidentiality B) Integrity C) Availability D) Authenticity ?? SOLUTION: B) Integrity (Page 7)

Security_Requirements QUESTION: Which security requirement deals with the property of being genuine and verifiable? OPTIONS: A) Accountability B) Authenticity C) Integrity D) Availability ?? SOLUTION: B) Authenticity (Page 7)

OSI_Security_Architecture QUESTION: The OSI security architecture focuses on what three key aspects? OPTIONS: ?? SOLUTION: Security Attacks, Security Mechanisms, Security Services (Page 11)

Security_Attacks QUESTION: A security attack is any action that compromises the _________ of information owned by an organization. OPTIONS: ?? SOLUTION: security (Page 12)

Security_Attacks QUESTION: Security attacks are broadly classified into two categories: ______ attacks and ______ attacks. OPTIONS: ?? SOLUTION: Passive, Active (Page 12)

Passive_Attacks QUESTION: Eavesdropping on transmissions is characteristic of which type of attack? OPTIONS: A) Active Attack B) Passive Attack C) Denial-of-Service Attack D) Masquerade Attack ?? SOLUTION: B) Passive Attack (Page 13)

Passive_Attacks QUESTION: Name the two types of passive attacks mentioned. OPTIONS: ?? SOLUTION: Release of message contents, Traffic analysis (Page 14)

Passive_Attacks QUESTION: Observing the frequency and length of communication is a part of: OPTIONS: A) Release of Message Contents B) Traffic Analysis C) Masquerade D) Replay ?? SOLUTION: B) Traffic Analysis (Page 15)

Active_Attacks QUESTION: Active attacks involve modification of the data stream or creation of a ______ stream. OPTIONS: ?? SOLUTION: false (Page 16)

Active_Attacks QUESTION: List the four categories of active attacks. OPTIONS: ?? SOLUTION: Masquerade, Replay, Modification of messages, Denial of service (Page 17)

Active_Attacks QUESTION: Which type of active attack involves an entity pretending to be a different entity? OPTIONS: A) Replay B) Modification of messages C) Masquerade D) Denial of service ?? SOLUTION: C) Masquerade (Page 18)

Active_Attacks QUESTION: A replay attack is also known as a ________ attack. OPTIONS: ?? SOLUTION: playback (Page 19)

Active_Attacks QUESTION: Preventing legitimate users from accessing a service is the goal of a _______ attack. OPTIONS: ?? SOLUTION: Denial of service (DoS) (Page 20)

Security_Mechanisms QUESTION: Encipherment, Access Control, and Digital Signature are examples of: OPTIONS: A) Security Attacks B) Security Services C) Security Mechanisms D) Security Policies ?? SOLUTION: C) Security Mechanisms (Page 21)

Encipherment QUESTION: Encipherment transforms data into a form that is not readily ______. OPTIONS: ?? SOLUTION: intelligible (Page 22)

Digital_Signature QUESTION: In a digital signature scheme, the sender uses their _______ key to sign, and the receiver uses the sender’s ______ key to verify. OPTIONS: ?? SOLUTION: private, public (Page 24)

Data_Integrity QUESTION: Data integrity provides assurance that data has not been altered in an ________ manner. OPTIONS: ?? SOLUTION: unauthorised (Page 25)

Authentication_Exchange QUESTION: Authentication exchange is a mechanism to ensure the ______ of an entity. OPTIONS: ?? SOLUTION: identity (Page 26)

Traffic_Padding QUESTION: Inserting bits into gaps in a data stream to frustrate traffic analysis is called ______. OPTIONS: ?? SOLUTION: Traffic Padding (Page 27)

Routing_and_Notarization QUESTION: The use of a trusted third party to assure certain properties of a data exchange is known as ______. OPTIONS: ?? SOLUTION: Notarization (Page 28)