logo

Crowdly

Cryptography and Network Security(BCSE309L)

Looking for Cryptography and Network Security(BCSE309L) test answers and solutions? Browse our comprehensive collection of verified answers for Cryptography and Network Security(BCSE309L) at lms.vit.ac.in.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

100%
0%
0%
0%
View this question

A company implements AES-128

encryption on IoT devices, but a researcher discovers that by

measuring

power consumption

, they can recover the AES key in milliseconds.

Which mitigation technique would

be

most effective against this attack?

a) Using a larger key size

(AES-256 instead of AES-128)

b) Implementing

constant-time

operations to prevent data-dependent

leakage

c) Encrypting the plaintext

twice with different keys

d) Using

hash functions instead of block ciphers

0%
100%
0%
0%
View this question

100%
0%
0%
0%
View this question

A company implements

X.509

digital certificates

for employee authentication. However, an attacker

manages to perform a

man-in-the-middle (MITM) attack

despite

certificate-based authentication.

What is the most likely reason

this attack was successful?

a) The certificate authority (CA)

was

compromised, allowing fake certificates

b) The encryption used was RSA-1024, which is

too weak

c) The attacker exploited a

replay attack on the authentication protocol

d) The certificate contained a weak

hash function like MD5

 

100%
0%
0%
0%
View this question

If a plaintext message is

528

bits

long and AES is used in ECB mode with a 128-bit block size

,

how many blocks will be needed?

a) 4

b) 5

c) 6

d) 7

0%
100%
0%
0%
View this question

What happens if two parties using IPsec do not establish a Security Association (SA)?

a) The connection fails because encryption keys are not exchanged.

b) The data is encrypted with a default key.

c) The authentication protocol switches to Kerberos.

d) The connection proceeds without encryption.

100%
0%
0%
0%
View this question

100%
0%
0%
0%
View this question

Want instant access to all verified answers on lms.vit.ac.in?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!