Steganography Examples Quiz
39 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which statement about unkeyed hash functions is true?

  • The output solely depends on input data. (correct)
  • They guarantee message origin authenticity.
  • They require a cryptographic key.
  • They allow identification of the sender.

What type of mapping does hashing perform?

  • Many-to-one mapping. (correct)
  • Many-to-many mapping.
  • One-to-one mapping.
  • One-to-none mapping.

Which of the following are examples of hash functions?

  • SHA-1 and Triple-DES
  • AES and DES
  • MD5 and SHA-1 (correct)
  • RSA and AES

Which statement regarding the speed of hash functions compared to encryption methods is correct?

<p>Hash functions are faster than public-key encryption. (B)</p> Signup and view all the answers

What are the block and key sizes used in the DES algorithm?

<p>64 bits, 56 bits (C)</p> Signup and view all the answers

Which encryption method uses a one-to-one mapping?

<p>Encryption (B)</p> Signup and view all the answers

Which of the following statements about symmetric key encryption is true?

<p>It is faster than public key encryption. (B), It is slower than hash functions. (C)</p> Signup and view all the answers

Which of the following accurately describes the nature of encryption?

<p>It requires a key for unique output. (B), It maintains message authenticity. (C)</p> Signup and view all the answers

Which statement correctly describes the verification process of a digital signature?

<p>Any recipient can use the signer's public key for verification. (D)</p> Signup and view all the answers

What is the role of the private key in a digital signature?

<p>It is used by the signer to sign the document. (A)</p> Signup and view all the answers

What does the SSL record protocol primarily ensure?

<p>Data integrity through a hashing mechanism. (C)</p> Signup and view all the answers

Which layer is responsible for end-to-end reliable data transfer with error recovery and flow control?

<p>Transport layer (A)</p> Signup and view all the answers

Which option correctly identifies a feature not provided by the SSL Record protocol?

<p>Non-repudiation guarantee. (D)</p> Signup and view all the answers

Which of the following correctly illustrates an application of steganography?

<p>Concealing data within an image file. (B)</p> Signup and view all the answers

What is the primary function of an IP address?

<p>To uniquely identify a host in the network (D)</p> Signup and view all the answers

How does the feed water heater in a steam power plant primarily preheat feed water?

<p>Extracting steam from the turbine (B)</p> Signup and view all the answers

What is a key distinction between digital signatures and handwritten signatures?

<p>Digital signatures require a public key for verification. (C)</p> Signup and view all the answers

Which statement accurately describes the size of the IP header in an IP datagram?

<p>It can vary between 20 to 60 bytes (D)</p> Signup and view all the answers

Which option correctly represents the heating process in the Rankine cycle?

<p>Representation ii (C)</p> Signup and view all the answers

What is NOT an example of steganography?

<p>Encrypting files for privacy. (D)</p> Signup and view all the answers

What is the value of the HLEN field if the IP header is 224 bits long?

<p>7 (B)</p> Signup and view all the answers

How many bits are used for the IP address in IPv4?

<p>32 bits (A)</p> Signup and view all the answers

Which of the following options is an invalid port number in TCP/IP?

<p>80800 (D)</p> Signup and view all the answers

Why is encryption also regarded as a part of the SSL Record protocol's functionality?

<p>It protects data from unauthorized access. (B)</p> Signup and view all the answers

What is the difference in temperatures that must be measured when assessing the efficiency of the economizer?

<p>Difference between the temperatures of flue gases and inlet of evaporator (D)</p> Signup and view all the answers

In a Rankine cycle with reheating, which segment of the cycle is indicative of the reheating process?

<p>C-D (C)</p> Signup and view all the answers

What is the maximum value for a valid port number in TCP/IP?

<p>65535 (A)</p> Signup and view all the answers

During which part of the Rankine cycle does heat rejection occur?

<p>At constant pressure (C)</p> Signup and view all the answers

Which of the following correctly describes the network layer's primary role?

<p>It routes packets from one node to another. (B)</p> Signup and view all the answers

What is the formula for calculating exergy destroyed in the turbine?

<p>Difference between exergy delivered to the turbine and exergy delivered to the shaft (D)</p> Signup and view all the answers

In a regenerative Rankine cycle, what is the expression for the mass fraction of steam extracted from the turbine?

<p>m = (h6 - h4) / (h1 - h4) (D)</p> Signup and view all the answers

What is the calculated turbine work when steam exits at 15 kPa?

<p>1193.2 kJ/kg (C)</p> Signup and view all the answers

What enthalpy value corresponds to the state of steam at the turbine inlet at 6.0 MPa and 500 °C?

<p>3422.2 kJ/kg (D)</p> Signup and view all the answers

In the regenerative Rankine cycle, what is the purpose of bleeding steam from the turbine?

<p>To facilitate heat addition at a higher temperature (D)</p> Signup and view all the answers

If the fraction of steam bled off for regeneration is 0.2, what is the mass flow rate of steam at the turbine inlet if the net power output is 120 MW?

<p>120 kg/s (C)</p> Signup and view all the answers

What is the specific enthalpy of steam at the exit of the turbine as deduced from the information provided?

<p>2228.98 kJ/kg (B)</p> Signup and view all the answers

Which statement accurately describes the regenerative steam power cycle?

<p>It improves overall cycle efficiency by saving energy. (A)</p> Signup and view all the answers

What is the significance of the isentropic efficiency in this system?

<p>It measures the performance of the turbine compared to ideal conditions. (C)</p> Signup and view all the answers

What does the enthalpy at the bleeding point of the regenerative Rankine cycle equal to?

<p>3000 kJ/kg (A)</p> Signup and view all the answers

Study Notes

Steganography Examples

  • Hiding text information within an image file is an example of steganography
  • Hiding text information within an audio clip is an example of steganography
  • Hiding secret information within an executable file is an example of steganography

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

ilovepdf_merged_merged.pdf

Description

Test your knowledge on the different techniques of steganography. This quiz covers various methods of hiding information within images, audio clips, and executable files. See how well you understand this fascinating area of information security.

More Like This

Use Quizgecko on...
Browser
Browser