Steganography Examples Quiz
39 Questions
0 Views

Steganography Examples Quiz

Created by
@CalmKeytar8296

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which statement about unkeyed hash functions is true?

  • The output solely depends on input data. (correct)
  • They guarantee message origin authenticity.
  • They require a cryptographic key.
  • They allow identification of the sender.
  • What type of mapping does hashing perform?

  • Many-to-one mapping. (correct)
  • Many-to-many mapping.
  • One-to-one mapping.
  • One-to-none mapping.
  • Which of the following are examples of hash functions?

  • SHA-1 and Triple-DES
  • AES and DES
  • MD5 and SHA-1 (correct)
  • RSA and AES
  • Which statement regarding the speed of hash functions compared to encryption methods is correct?

    <p>Hash functions are faster than public-key encryption.</p> Signup and view all the answers

    What are the block and key sizes used in the DES algorithm?

    <p>64 bits, 56 bits</p> Signup and view all the answers

    Which encryption method uses a one-to-one mapping?

    <p>Encryption</p> Signup and view all the answers

    Which of the following statements about symmetric key encryption is true?

    <p>It is faster than public key encryption.</p> Signup and view all the answers

    Which of the following accurately describes the nature of encryption?

    <p>It requires a key for unique output.</p> Signup and view all the answers

    Which statement correctly describes the verification process of a digital signature?

    <p>Any recipient can use the signer's public key for verification.</p> Signup and view all the answers

    What is the role of the private key in a digital signature?

    <p>It is used by the signer to sign the document.</p> Signup and view all the answers

    What does the SSL record protocol primarily ensure?

    <p>Data integrity through a hashing mechanism.</p> Signup and view all the answers

    Which layer is responsible for end-to-end reliable data transfer with error recovery and flow control?

    <p>Transport layer</p> Signup and view all the answers

    Which option correctly identifies a feature not provided by the SSL Record protocol?

    <p>Non-repudiation guarantee.</p> Signup and view all the answers

    Which of the following correctly illustrates an application of steganography?

    <p>Concealing data within an image file.</p> Signup and view all the answers

    What is the primary function of an IP address?

    <p>To uniquely identify a host in the network</p> Signup and view all the answers

    How does the feed water heater in a steam power plant primarily preheat feed water?

    <p>Extracting steam from the turbine</p> Signup and view all the answers

    What is a key distinction between digital signatures and handwritten signatures?

    <p>Digital signatures require a public key for verification.</p> Signup and view all the answers

    Which statement accurately describes the size of the IP header in an IP datagram?

    <p>It can vary between 20 to 60 bytes</p> Signup and view all the answers

    Which option correctly represents the heating process in the Rankine cycle?

    <p>Representation ii</p> Signup and view all the answers

    What is NOT an example of steganography?

    <p>Encrypting files for privacy.</p> Signup and view all the answers

    What is the value of the HLEN field if the IP header is 224 bits long?

    <p>7</p> Signup and view all the answers

    How many bits are used for the IP address in IPv4?

    <p>32 bits</p> Signup and view all the answers

    Which of the following options is an invalid port number in TCP/IP?

    <p>80800</p> Signup and view all the answers

    Why is encryption also regarded as a part of the SSL Record protocol's functionality?

    <p>It protects data from unauthorized access.</p> Signup and view all the answers

    What is the difference in temperatures that must be measured when assessing the efficiency of the economizer?

    <p>Difference between the temperatures of flue gases and inlet of evaporator</p> Signup and view all the answers

    In a Rankine cycle with reheating, which segment of the cycle is indicative of the reheating process?

    <p>C-D</p> Signup and view all the answers

    What is the maximum value for a valid port number in TCP/IP?

    <p>65535</p> Signup and view all the answers

    During which part of the Rankine cycle does heat rejection occur?

    <p>At constant pressure</p> Signup and view all the answers

    Which of the following correctly describes the network layer's primary role?

    <p>It routes packets from one node to another.</p> Signup and view all the answers

    What is the formula for calculating exergy destroyed in the turbine?

    <p>Difference between exergy delivered to the turbine and exergy delivered to the shaft</p> Signup and view all the answers

    In a regenerative Rankine cycle, what is the expression for the mass fraction of steam extracted from the turbine?

    <p>m = (h6 - h4) / (h1 - h4)</p> Signup and view all the answers

    What is the calculated turbine work when steam exits at 15 kPa?

    <p>1193.2 kJ/kg</p> Signup and view all the answers

    What enthalpy value corresponds to the state of steam at the turbine inlet at 6.0 MPa and 500 °C?

    <p>3422.2 kJ/kg</p> Signup and view all the answers

    In the regenerative Rankine cycle, what is the purpose of bleeding steam from the turbine?

    <p>To facilitate heat addition at a higher temperature</p> Signup and view all the answers

    If the fraction of steam bled off for regeneration is 0.2, what is the mass flow rate of steam at the turbine inlet if the net power output is 120 MW?

    <p>120 kg/s</p> Signup and view all the answers

    What is the specific enthalpy of steam at the exit of the turbine as deduced from the information provided?

    <p>2228.98 kJ/kg</p> Signup and view all the answers

    Which statement accurately describes the regenerative steam power cycle?

    <p>It improves overall cycle efficiency by saving energy.</p> Signup and view all the answers

    What is the significance of the isentropic efficiency in this system?

    <p>It measures the performance of the turbine compared to ideal conditions.</p> Signup and view all the answers

    What does the enthalpy at the bleeding point of the regenerative Rankine cycle equal to?

    <p>3000 kJ/kg</p> Signup and view all the answers

    Study Notes

    Steganography Examples

    • Hiding text information within an image file is an example of steganography
    • Hiding text information within an audio clip is an example of steganography
    • Hiding secret information within an executable file is an example of steganography

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    ilovepdf_merged_merged.pdf

    Description

    Test your knowledge on the different techniques of steganography. This quiz covers various methods of hiding information within images, audio clips, and executable files. See how well you understand this fascinating area of information security.

    More Like This

    Audio Steganography Quiz
    10 questions
    Audio Steganography Techniques Quiz
    5 questions
    Steganography: Concealing Information
    10 questions
    Use Quizgecko on...
    Browser
    Browser