Here, we have a set of multiple-choice questions and answers (quiz) on cryptography basics (basic concepts of cryptography techniques).

questions

Title
Which of the following is not a type of symmetric-key cryptography technique?

Which of the following is not a type of symmetric-key cryptography technique?


  1. Caesar cipher
  2. Data Encryption Standard (DES)
  3. Diffie Hellman cipher
  4. Playfair cipher
discuss
Which of the following is not a principle of data security?

Which of the following is not a principle of data security?


  1. Data Confidentiality
  2. Data Integrity
  3. Authentication
  4. None of the above
discuss
Which of the following security attacks is not an active attack? OR Which of the following attacks is a passive attack?

Which of the following security attacks is not an active attack?

OR

Which of the following attacks is a passive attack?


  1. Masquerade
  2. Modification of message
  3. Denial of service
  4. Traffic analysis
discuss
Which of the following options correctly defines the Brute force attack?

Which of the following options correctly defines the Brute force attack?


  1. Brutally forcing the user to share the useful information like pins and passwords.
  2. Trying every possible key to decrypt the message.
  3. One entity pretends to be some other entity
  4. The message or information is modified before sending it to the receiver.
discuss
"A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?

"A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?


  1. An integer values
  2. A square matrix
  3. An array of characters (i.e. a string)
  4. All of the above
discuss
A mechanism used to encrypt and decrypt data

A mechanism used to encrypt and decrypt data.


  1. Cryptography
  2. Algorithm
  3. Data flow
  4. None of these
discuss
To encrypt the plaintext, a cryptographic algorithm works in combination with a key

To encrypt the plaintext, a cryptographic algorithm works in combination with a key...


  1. Word, number, or phrase
  2. Special Symbols
  3. Function Keys
  4. All of these
discuss
The plaintext encrypts to different cipher text with different keys

The plaintext encrypts to different cipher text with different keys


  1. True
  2. False
discuss
Conventional cryptography also known as ... encryption

Conventional cryptography also known as ... encryption.


  1. asymmetric-key
  2. logical-key
  3. symmetric-key
  4. None of these
discuss
The Data Encryption Standard (DES) is an example of a

The Data Encryption Standard (DES) is an example of a ...


  1. Conventional cryptosystem
  2. Asymmetric cryptosystem
  3. Caesar's cryptosystem
  4. All of these
discuss
Public key cryptography is a ... cryptosystem

Public key cryptography is a ... cryptosystem


  1. Symmetric
  2. Asymmetric
  3. Symmetric & Asymmetric both
  4. None of these
discuss
Security Goals of Cryptography are

Security Goals of Cryptography are


  1. Confidentiality
  2. Authenticityn
  3. Data integrityn
  4. Non-repudiation
  5. All of these
discuss
A process of studying cryptographic system is known as Cryptanalysis

A process of studying cryptographic system is known as Cryptanalysis


  1. True
  2. False
discuss
Cipher in cryptography is –

Cipher in cryptography is –


  1. Encrypted message
  2. Algorithm for performing encryption and decryption
  3. Both algorithm for performing encryption and decryption and encrypted message
  4. Decrypted message
discuss
The private key in asymmetric key cryptography is kept by

The private key in asymmetric key cryptography is kept by


  1. Sender
  2. Receiver
  3. Sender and receiver
  4. All the connected devices to the network
discuss
Which one of the following algorithms is not used in asymmetric-key cryptography?

Which one of the following algorithms is not used in asymmetric-key cryptography?


  1. DSA algorithm
  2. Electronic code book algorithm
  3. Diffie-Hellman algorithm
  4. RSA algorithm
discuss
Which is the cryptographic protocol that is used to protect an HTTP connection?

Which is the cryptographic protocol that is used to protect an HTTP connection?


  1. Resource reservation protocol
  2. SCTP
  3. TLS
  4. ECN
discuss
A key is a value that works with a cryptographic algorithm to produce a specific cipher text

A key is a value that works with a cryptographic algorithm to produce a specific cipher text.


  1. True
  2. False
discuss
A Public key size and conventional cryptography’s secret key size are closely related with one another

A Public key size and conventional cryptography’s secret key size are closely related with one another.


  1. True
  2. False
discuss
ElGamal encryption system is an asymmetric key encryption algorithm

ElGamal encryption system is an asymmetric key encryption algorithm.


  1. Public-key cryptography
  2. Private-key cryptography
  3. Both
  4. None of these
discuss
total MCQs: 20

MCQs

20

Views

30

Best Answers

299

Points

5