Sail E0 Webinar

MCQs

Total Questions : 10
Question 1. In cryptography, what is cipher?
  1.    algorithm for performing encryption and decryption
  2.    encrypted message
  3.    both (a) and (b)
  4.    none of the mentioned
 Discuss Question
Answer: Option A. -> algorithm for performing encryption and decryption


None.


Question 2. What is data encryption standard (DES)?
  1.    block cipher
  2.    stream cipher
  3.    bit cipher
  4.    none of the mentioned
 Discuss Question
Answer: Option A. -> block cipher


None.


Question 3. In cryptography, the order of the letters in a message is rearranged by:
  1.    transpositional ciphers
  2.    substitution ciphers
  3.    both (a) and (b)
  4.    none of the mentioned
 Discuss Question
Answer: Option A. -> transpositional ciphers


None.


Question 4. In asymmetric key cryptography, the private key is kept by:
  1.    sender
  2.    receiver
  3.    sender and receiver
  4.    all the connected devices to the network
 Discuss Question
Answer: Option B. -> receiver


None.


Question 5. Which one of the following algorithm is not used in asymmetric-key cryptography?
  1.    RSA algorithm
  2.    diffie-hellman algorithm
  3.    electronic code book algorithm
  4.    none of the mentioned
 Discuss Question
Answer: Option C. -> electronic code book algorithm


None.


Question 6. Voice privacy in GSM cellular telephone protocol is provided by:
  1.    A5/2 cipher
  2.    b5/4 cipher
  3.    b5/6 cipher
  4.    b5/8 cipher
 Discuss Question
Answer: Option A. -> A5/2 cipher


None.


Question 7. Which one of the following is a cryptographic protocol used to secure HTTP connection?
  1.    stream control transmission protocol (SCTP)
  2.    transport layer security (TSL)
  3.    explicit congestion notification (ECN)
  4.    resource reservation protocol
 Discuss Question
Answer: Option B. -> transport layer security (TSL)


None.


Question 8. Cryptographic hash function takes an arbitrary block of data and returns:
  1.    fixed size bit string
  2.    variable size bit string
  3.    both (a) and (b)
  4.    none of the mentioned
 Discuss Question
Answer: Option A. -> fixed size bit string


None.


Question 9. ElGamal encryption system is:
  1.    symmetric key encryption algorithm
  2.    asymmetric key encryption algorithm
  3.    not an encryption algorithm
  4.    none of the mentioned
 Discuss Question
Answer: Option B. -> asymmetric key encryption algorithm


None.


Question 10. Cryptanalysis is used:
  1.    to find some insecurity in a cryptographic scheme
  2.    to increase the speed
  3.    to encrypt the data
  4.    none of the mentioned
 Discuss Question
Answer: Option A. -> to find some insecurity in a cryptographic scheme


None.


Latest Videos

Latest Test Papers