Shree9975 wrote:
shriramvelamuriCan you please explain me how you got Answers for Question 1 and Question 2 correct.
I am not getting enough information to mark these answers correct.
And for Question 3 i was confused between answers 2 and 3.On what basis did u mark Option 3.
It would be helpful if u help.
Thanks
Hi Shree9975,
Let me try my best here to help you with the answers.
(Q1) According to the passage, which of the following was a requirement of an effective mnemonic cipher?
(A) It must require few tools or files that could give away a spy's secret operations -
Last sentence in 1st paragraph gives us this information. "Often called mnemonic ciphers, they distinguished themselves by requiring little, if any, in the way of material that would arouse suspicion". Correct !!(B) It should include written records to ensure no data is lost --
2nd para last line contradicts this statement -- "never written in any documents ". Wrong(C) It must require an extensive and complex process for the agent to follow --
This choice is too extreme. Info in 3rd paragraph gives "the spy needed only to remember three individual pieces of information" and author also talks about the complexity of VIC ciphers. So it may or may not be required t be complex. MUST is an extreme word. Wrong(D) It should disguise the secret nature of the message as commonplace communications -
The last line in 4th para contradicts this statement. "while its nature as a secret communication was clear, the message contained within was as thoroughly obscured as was then possible" . Wrong(E) It need not offer extremely high levels of security. -
Last sentence in 1st para contradicts this statement. - "offered extremely high levels of security" . Wrong---------------------------------------------------------
(Q2) Based on the information contained within the passage, transposition tables are most likely to be:
(A) The most effective way of securing a secret message -
Unsupported claim actually. Nothing in the passage states that it is the most effective way. Too extreme. May be or May not be scenario. Wrong(B) One of the components of the VIC cipher -
Author talks about VIC cipher in 3rd paragraph and mentions the use of transposition tables in 4th paragraph- Correct(C) A technique unique to the VIC cipher -
Unsupported claim again. May be or may not be scenario. It is used in VIC cipher. Nothing stated that it is unique to VIC alone. Wrong(D) One of the pieces of information memorized by a Soviet agent -
Author talks about transposition tables in 4th paragraph. This choice confuses the four pieces of information(given in 3rd paragraph) that were memorized with the transposition tables. Wrong(E) Part of all mnemonic ciphers -
Unsupported claim again. May be or may not be scenario. It is used in VIC cipher. Nothing stated that it is a part of all ciphers . Wrong----------------------------------------------------------------------------------
(Q3) Which of the following could most reasonably be a title for this passage?
(A) VIC: Straddling Monoalphabetic Substitution with Modified Double Transposition -
Very technical heading about VIC cipher . Author speaks about mnemonic ciphers in general and talks about VIC in 3rd and 4th paragraphs mostly like an example. Hence will not suit. Wrong.(B) How We Knew: Western Code Breaking Victories over the Soviet Union -
3rd paragraph starts with " came a range of mnemonic ciphers, some of the most clever ever developed, from the Soviet intelligence apparatus" - Author actually gives an appreciation remark and discusses how secure VIC was, making this answer unlikely. Wrong(C) Under the Cloak: Mnemonic Ciphers for Humint Operations -
Gives a broad scope about mnemonic ciphers. - Correct(D) Digitally Secret: How Computer Ciphers are Changing the Spy Business -
focuses on modern ciphers, which are only discussed in one sentence in the passage. Wrong(E) Cold Nights of Fear: Confessions of a Double Agent -
Irrelevant according to me ! Wrong ! Hope this helps !