Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

A device that is used to connect a number of LANs is –(a) Router(b) Repeater(c) Bridge(d) SwitchThis question was addressed to me in an online quiz.I'd like to ask this question from Network Hardware topic in section Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Right choice is (a) Router

To EXPLAIN I WOULD SAY: A device that is used to connect a number of LANS is a Router.

52.

What is the number of possible 3 x 3 affine cipher transformations ?(a) 168(b) 840(c) 1024(d) 1344This question was addressed to me at a job interview.Origin of the question is Overview in section Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» CORRECT option is (d) 1344

To elaborate: Since ‘A’ cannot have columns of ‘0’s. so there are ‘7’ choices i.e. 001/010/011/100/101/110/111. ‘a1’ is chosen for first column of ‘A. We have ‘6’ choices for second column, let ‘a2’ be chosen for second column. The final column can be any 3-tuple except 0, a1, a2, a1+a2. That means any one of the remaining ‘4’ 3-tuples may be chosen for the final column.

(Total number [email protected] possibilities for A)}=k=7×6×4=168

(Number of [email protected] BLOCK CIPHER transformation)}=k×t=8×168 =1344.
53.

Maurer’s Universal Statistical Test is(a) a test to determine whether the number of runs of ones and zeros of various lengths is as expecte(b) a test to detect if a sequence can be significantly compressed without loss of information(c) a test to determine whether the number of ones and zeros in a sequence is approx the same as in a truely random o/p(d) a test for the check of evenness in the 1s and 0sThis question was posed to me during an interview.This interesting question is from Overview in portion Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The CORRECT choice is (b) a test to detect if a sequence can be SIGNIFICANTLY COMPRESSED without loss of information

Explanation: Maurer’s UNIVERSAL Statistical Test is a test to detect if a sequence can be significantly compressed without loss of information.

54.

A device is sending out data at the rate of 1000 bps. How long does it take to send a file of 100,000 characters?(a) 200s(b) 400s(c) 600s(d) 800sI have been asked this question during a job interview.This key question is from Layers in portion Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» RIGHT ANSWER is (d) 800s

Easiest EXPLANATION: ((100,000 × 8) / 1000) s = 800 s.
55.

Which is the smallest unit amongst the following with reference to the ATM-(a) transmission path(b) virtual path(c) virtual circuit(d) all are of the same sizeThis question was addressed to me in an interview for job.This interesting question is from Network Hardware topic in section Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The correct answer is (c) virtual circuit

To EXPLAIN I would SAY: Virtual CIRCUITS are the smallest UNIT in the above options.

56.

Which topology has a central hub?(a) Mesh(b) Star(c) Bus(d) RingI got this question in unit test.This key question is from Topologies in chapter Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Right ANSWER is (B) STAR

Easy explanation: The star TOPOLOGY has a single hub.

57.

Using SDES, the Plaintext for the Ciphertext 00001111, given that the key is 1111111111 is,(a) 01100111(b) 00001010(c) 11111111(d) 01101101I have been asked this question in homework.The query is from Overview topic in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» CORRECT OPTION is (c) 11111111

The best EXPLANATION: Perform the SDES Decryption algorithm and COMPUTE the cipher text.
58.

Which of the following slows the cryptographic algorithm – 1) Increase in Number of rounds 2) Decrease in Block size 3) Decrease in Key Size 4) Increase in Sub key Generationa)(a) 1 and 3(b) 2 and 3(c) 3 and 4(d) 2 and 4This question was posed to me in semester exam.This is a very interesting question from Overview topic in section Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» CORRECT CHOICE is (b) 2 and 3

To EXPLAIN I would say: Increase in any of the above 4 leads to SLOWING of the cipher algorithm i.e. more computational time will be REQUIRED.
59.

For 1000 nodes in IP level, how many keys would be required?(a) 499000(b) 499500(c) 500500(d) 500000I got this question in a job interview.I need to ask this question from Overview in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Correct CHOICE is (b) 499500

For EXPLANATION I WOULD say: Use N(N-1)/2 where N=1000.

60.

If a periodic signal is decomposed into five sine waves with frequencies of 100, 300, 500, 700, and 900 Hz, what is its bandwidth?(a) 2500 Hz(b) 900 Hz(c) 800 Hz(d) can’t be determined with the information givenI have been asked this question in an online interview.I'd like to ask this question from Layers topic in chapter Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» RIGHT ANSWER is (c) 800 HZ

Best explanation: The bandwidth is 900-100 = 800 Hz.
61.

Which of the following was the IBM Token bus?(a) IEEE 802.10(b) IEEE 802.11(c) IEEE 802.1(d) IEEE 802.4I got this question in my homework.Question is taken from Network Hardware in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The CORRECT answer is (d) IEEE 802.4

Best EXPLANATION: The IBM TOKEN bus was IEEE 802.4.

62.

In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ______________(a) Scaling of the existing bits(b) Duplication of the existing bits(c) Addition of zeros(d) Addition of onesI got this question in exam.The doubt is from Overview in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The CORRECT answer is (a) Scaling of the existing bits

For explanation I would say: The ROUND KEY is 48 bits. The input is 32 bits. This input is first expanded to 48 bits (permutation plus an EXPANSION), that involves duplication of 16 of the bits.

63.

Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, the correct order of this chain is represented as –(a) X2 X1 X1 B(b) X1 X1 X2 A(c) X1 X2 X2 B(d) X1 X2 X2 AThe question was posed to me by my college director while I was bunking the class.Question is taken from Overview topic in section Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Right choice is (c) X1 X2 X2 B

The best explanation: The correct REPRESENTATION would be X1 X2 X2 B.

64.

In terms of the size of the network the correct order (ascending) is –(a) PAN, MAN, LAN, WAN(b) LAN, MAN, WAN, PAN(c) PAN, LAN, MAN, WAN(d) LAN, PAN, MAN, WANThis question was posed to me during an online interview.I'm obligated to ask this question of TCP/IP and OSI Reference Model in portion Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» RIGHT ANSWER is (c) PAN, LAN, MAN, WAN

The explanation: Personal AREA NETWORK, Local Area Network, Metropolitan Area Network, Wide Area Network is the correct order in terms of size of the network from smallest to largest.
65.

SONET stands for ________(a) Secure Offline Network(b) Synchronous Optical Network(c) Service Offline Network(d) Secure Optical NetwrokThe question was asked in unit test.The above asked question is from TCP/IP and OSI Reference Model in section Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The correct CHOICE is (b) SYNCHRONOUS Optical Network

The best I can explain: SONET STANDS for Synchronous Optical Network.

66.

10010100101 is the code received. Find the error bit.(a) 7(b) 5(c) 2(d) 3This question was addressed to me in my homework.I want to ask this question from Layers topic in chapter Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The CORRECT answer is (a) 7

To explain: Error OCCURS in bit 7 and can be found via hamming CODE.

67.

Which of the following is the correct encryption statement representation for the XTS-AES mode?(a) E(K1,P) XOR T(b) E(K2,T) XOR P(c) E(K1,T XOR P) XOR P(d) E(K1,P XOR T) XOR TThis question was addressed to me in quiz.My doubt stems from Overview topic in chapter Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» RIGHT choice is (d) E(K1,P XOR T) XOR T

For EXPLANATION I would SAY: The correct encryption REPRESENTATION would be : C = E(K1,P XOR T) XOR T.
68.

A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces 500 frames per second?(a) 146 frames(b) 92 frames(c) 38 frames(d) 156 framesThe question was posed to me in an internship interview.Query is from Layers in portion Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Correct option is (b) 92 frames

The explanation: If the SYSTEM CREATES 500 frames per second, or 1/2 frames per millisecond.

Then G = 1/2.

S = G × e−2G= 0.184 (18.4 percent)

This MEANS that

Throughput = 500 × 0.184 = 92

Only 92 frames out of 500 will probably survive

This is the maximum throughput case, percentage-wise.

69.

A device which is used to boost the signal between two cable segments or wireless access points is(a) Booster(b) Repeater(c) Switch(d) RouterThis question was addressed to me during an online interview.This intriguing question comes from Network Hardware topic in section Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The CORRECT ANSWER is (C) Switch

To explain: The correct TERM for such a device is a REPEATER.

70.

How many lines are required for the bus topology?(a) N(N-1)/2(b) N(c) N+1(d) none of the mentionedThe question was asked in a national level competition.I want to ask this question from Topologies topic in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Correct choice is (c) N+1

To EXPLAIN: N drop lines and 1 bus LINE.

71.

The GCD of x^5+ x^4+ x^3– x^2 – x + 1 and x^3 + x^2+ x + 1 over GF(3) is(a) 1(b) x(c) x + 1(d) x^2 + 1The question was posed to me in final exam.This intriguing question comes from Overview in chapter Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The correct CHOICE is (c) X + 1

To elaborate: The GCD ofx^5+ x^4+ x^3 – x^2 – x + 1 and x^3 + x^2+ x + 1 over GF(3) is x + 1.

72.

The number of rounds in RC5 can range from 0 to _____________(a) 127(b) 63(c) 255(d) 31This question was addressed to me in unit test.Asked question is from Overview topic in chapter Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The CORRECT ANSWER is (C) 255

To elaborate: Number of Rounds range from 0 to 255.

73.

For the group Sn of all permutations of n distinct symbols, what is the number of elements in Sn?(a) n(b) n-1(c) 2n(d) n!The question was asked by my college director while I was bunking the class.This key question is from Overview in chapter Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» CORRECT CHOICE is (d) n!

Easiest explanation: There there are n DISTINCT SYMBOLS there will be n! elements.
74.

Which of the following does not lie in the Application Layer of the TCP/IP Model?(a) HTTP(b) SMTP(c) RTP(d) UDPI got this question in an online quiz.This interesting question is from TCP/IP and OSI Reference Model topic in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» RIGHT option is (d) UDP

To EXPLAIN: UDP LIES in the Transport LAYER.
75.

Encryption and Compression are functions of which OSI layer?(a) Presentation Layer(b) Application Layer(c) Session Layer(d) Data Link LayerThis question was addressed to me in an online interview.My question is taken from TCP/IP and OSI Reference Model in portion Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Correct option is (a) Presentation LAYER

The BEST EXPLANATION: Encryption and COMPRESSION are functions of the Presentation Layer.

76.

In collision free protocol channel efficiency is given by-(a) d/(d + log2(N))(b) d*(d + log2(N))(c) log2(N)(d) (d + log2(N))This question was posed to me in an online interview.This interesting question is from Layers topic in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The correct option is (a) d/(d + LOG2(N))

Best EXPLANATION: In collision FREE PROTOCOL CHANNEL efficiency is given by d/(d + log2(N)).

77.

A pure ALOHA network transmits 200-bit frames on a shared channel of 200 kbps. What is the throughput if the system (all stations together) produces 1000 frames per second?(a) 150 frames(b) 80 frames(c) 135 frames(d) 96 framesI got this question by my college professor while I was bunking the class.Question is from Layers in section Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» CORRECT answer is (c) 135 frames

To ELABORATE: FRAME transmission time

Tfr= 200/200 KBPS or 1 ms.

If the system creates 1000 frames per SECOND, or 1 frame

per millisecond, then G = 1

S = G × e−2G = 0.135 (13.5 percent)

This means that,

Throughput =1000 × 0.135 = 135 frames.
78.

Reduce the following Big-O notation. O[ ax^7 + 3 x^3 + sin(x)] =(a) O[ax^7].(b) O[sin(x)].(c) O[x^7].(d) O[x^7 + x^3].I had been asked this question by my college director while I was bunking the class.The query is from Overview in section Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» CORRECT option is (C) O[x^7].

For explanation: O[ ax^7 + 3 x^3 + SIN(x)] = O(ax^7) = O(x^7).
79.

A file contains 2 million bytes. How long does it take to download this file using a 56-Kbps channel?(a) 1-2 mins(b) 5-6 mins(c) 2-4 mins(d) 7-8 minsThe question was posed to me in quiz.Asked question is from Layers topic in chapter Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The correct choice is (b) 5-6 mins

The EXPLANATION is: With a 56-Kbps CHANNEL, it TAKES 16,000,000/56,000 = 289 s ≈ 5 MINUTES.

80.

The plaintext message consist of single letters with 5-bit numerical equivalents from (00000)2 to (11001)2. The secret deciphering key is the superincreasing 5-tuple (2, 3, 7, 15, 31), m = 61 and a = 17. Find the ciphertext for the message “WHY”.(a) C= (148, 143, 50)(b) C= (148, 143, 56)(c) C= (143, 148, 92)(d) C= (148, 132,92)I have been asked this question during an online interview.Question is from Overview in chapter Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Right choice is (a) C= (148, 143, 50)

Easy explanation: {WI }= {a VI mod m}

{wi} = { 17×2 mod 61, 17×3 mod 61, 17×7 mod 61, 17×15 mod 61, 17×31 mod 61}

{wi} = {34, 51, 58, 11, and 39}

PlainTextIn binaryCi

W- 2210110148

H – 700111143

Y – 241100050

So that the ciphertext sent will be C= (148, 143, 50).

81.

The Inverse S-box value for byte stored in cell (D,2)(a) 0x5F(b) 0x2D(c) 0x7F(d) 0x5DI got this question in an interview for internship.This interesting question is from Overview in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Right option is (c) 0X7F

Easy EXPLANATION: We FIRST find the MULTIPLICATIVE inverse of 0xD2. And then perform the matrix TRANSFORMATION to get 0x7F.

82.

A list of protocols used is known as –(a) protocol access(b) protocol stack(c) permutation stack(d) none of the mentionedI had been asked this question in an internship interview.My query is from Topologies in portion Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Right OPTION is (b) protocol stack

To explain I would say: A list of the protocols USED by a CERTAIN SYSTEM, one protocol per layer, is called a protocol stack.

83.

How many layers are there in the OSI reference model?(a) 4(b) 5(c) 6(d) 7The question was posed to me in examination.Question is taken from TCP/IP and OSI Reference Model topic in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» RIGHT option is (d) 7

Easy EXPLANATION: The 7 layers are : Physical Layer, Data Link Layer, Network Layer, TRANSPORT Layer, Session Layer, Presentation Layer, APPLICATION Layer.
84.

IEEE 802.8 is/was –(a) IBM Token Bus(b) Integrated Services LAN(c) Wireless LAN and Mesh(d) Fiber Optic TAGI got this question by my college director while I was bunking the class.This intriguing question originated from Network Hardware topic in chapter Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The correct answer is (d) FIBER Optic TAG

Explanation: IEEE 802.8 was the Fiber Optic TAG (DISBANDED).

85.

Using Differential Crypt-analysis, the minimum computations required to decipher the DES algorithm is-(a) 2^56(b) 2^43(c) 2^55(d) 2^47I had been asked this question in an online interview.This interesting question is from Overview topic in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Right ANSWER is (d) 2^47

For explanation: DIFFERENTIAL Crypt-analysis requires only 2^47 COMPUTATIONS to decipher the DES ALGORITHM.

86.

Which one of the following is not a RC5 mode of operation?(a) RC5 block cipher(b) RC5-Cipher Block Chaining(c) RC5-Cipher Padding(d) RC5-CipherText StealingThis question was posed to me during an internship interview.Query is from Overview topic in portion Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Correct answer is (C) RC5-Cipher Padding

The explanation: RFC 2040 [BALD96] DEFINES FOUR different MODES of operation:

1. RC5 block cipher

2. RC5-CBC

3. RC5-CBC-Pad

4. RC5-CTS.

87.

How many primitive roots does Z have?(a) 5(b) 8(c) 7(d) 6The question was posed to me in an online quiz.This question is from Overview topic in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The CORRECT ANSWER is (d) 6

For explanation I would say: Z<19> has the primitive ROOTS as 2,3,10,13,14 and 15.

88.

A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200-kbps bandwidth. Find the throughput if the system (all stations together) produces 500 frames per second.(a) 92 frames(b) 368 frames(c) 276 frames(d) 151 framesThe question was posed to me in an internship interview.I need to ask this question from Layers topic in section Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Right choice is (d) 151 frames

Explanation: G=1/2S = G × e−G = 0.303 (30.3 percent)

THROUGHPUT is 500 × 0.0303 = 151.

89.

A channel has a 1-MHz bandwidth. The SNR for this channel is 63. What is the appropriate signel level?(a) 2(b) 8(c) 4(d) 16This question was addressed to me in a job interview.This interesting question is from Layers topic in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The correct choice is (c) 4

To explain I would SAY: As a continuation to the previous question where we GET the channel capacity as 6 Mbps. For better PERFORMANCE we choose 4 Mbps. Thus we calculate L from –

4Mbps = 2 x 1 MHz x logL.

90.

In order to prevent a fast sender from swamping a slow receiver with data, feedback is often used. This process is known as-(a) flow control(b) multiplexing(c) congestion(d) none of the mentionedI had been asked this question during an online exam.I'd like to ask this question from Topologies in chapter Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Right CHOICE is (a) flow control

The explanation is: The PROCESS DEFINED above is known as Flow Control.

91.

Calculate the theoretical channel capacity. If SNR(dB) = 36 and the channel bandwidth is 2 MHz.(a) 12 Mbps(b) 24 Mbps(c) 16 Mbps(d) 32 MbpsThis question was addressed to me at a job interview.My question is based upon Layers in chapter Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Correct CHOICE is (b) 24 Mbps

For EXPLANATION I WOULD SAY: None.

92.

Reduce the following Big-O notation. O[ e^n + an^10] =(a) O[ an^10].(b) O[ n^10 ].(c) O[ e^n ].(d) O[ e^n+ n^10 ].I had been asked this question during an online exam.This key question is from Overview in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The correct answer is (C) O[ e^n ].

To explain I WOULD SAY: O[ e^n + an^10 ] = O[ e^n ].

93.

On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword “HUMOR” we get cipher text(a) abqdnwewuwjphfvrrtrfznsdokvl(b) abqdvmwuwjphfvvyyrfznydokvl(c) tbqyrvmwuwjphfvvyyrfznydokvl(d) baiuvmwuwjphfoeiyrfznydokvlThis question was posed to me in an interview for job.The query is from Overview topic in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The CORRECT OPTION is (b) abqdvmwuwjphfvvyyrfznydokvl

The EXPLANATION: Cipher TEXT:=Ci = PI + ki mod m (mod 26).

94.

The blowfish algorithm’s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___ bytes.(a) 4096(b) 4608(c) 4168(d) 4864I have been asked this question during an interview for a job.Question is taken from Overview topic in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Right choice is (c) 4168

Best explanation: Key expansion converts a key of at most 448 BITS into several SUB key arrays totaling 4168 BYTES i.e. eighteen 32-bit sub keys + FOUR 8×32-bit s BOXES = 4168.

95.

The multiplicative Inverse of 550 mod 1769 is –(a) 434(b) 224(c) 550(d) Does not existI had been asked this question in an interview for job.Question is taken from Overview in division Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

The correct OPTION is (a) 434

To explain I would SAY: The multiplicative Inverse of 550 MOD 1769 is 550.

96.

Find the order of group G= (a) 6(b) 4(c) 3(d) 5This question was addressed to me in an interview for job.Asked question is from Overview topic in portion Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer» RIGHT answer is (a) 6

Explanation: |G| = f(7) = (71-70) = 6

G == { 1, 2, 3, 4, 5, 6 }
97.

Which among the following values:17, 20, 38, and 50, does not have primitive roots in the group G = ?(a) 17(b) 20(c) 38(d) 50This question was addressed to me in an online interview.This intriguing question comes from Overview in portion Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security

Answer»

Correct option is (B) 20

Explanation: The GROUP G = has PRIMITIVE ROOTS only if n is 2, 4, pt, or 2pt

‘p’ is an odd prime and‘t’ is an integer.

G = has primitive roots, 17 is a prime.

G = has no primitive roots.

G = has primitive roots, 38 = 2 × 19 prime.

G = has primitive roots, 50 = 2 × 52 and 5 is a prime.