Here, we have a set of multiple-choice questions and answers (quiz) on cryptography basics (basic concepts of cryptography techniques).
Title | |
---|---|
Which of the following is not a type of symmetric-key cryptography technique?Which of the following is not a type of symmetric-key cryptography technique?
The answer is:
C. Diffie Hellman cipher
|
|
Which of the following is not a principle of data security?Which of the following is not a principle of data security?
The answer is:
D. None of the above
|
|
Which of the following security attacks is not an active attack? OR Which of the following attacks is a passive attack?Which of the following security attacks is not an active attack? OR Which of the following attacks is a passive attack?
The answer is:
D. Traffic analysis
|
|
Which of the following options correctly defines the Brute force attack?Which of the following options correctly defines the Brute force attack?
The answer is:
B. Trying every possible key to decrypt the message.
|
|
"A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?"A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?
The answer is:
D. All of the above
|
|
A mechanism used to encrypt and decrypt dataA mechanism used to encrypt and decrypt data.
The answer is:
A. Cryptography
|
|
To encrypt the plaintext, a cryptographic algorithm works in combination with a keyTo encrypt the plaintext, a cryptographic algorithm works in combination with a key...
The answer is:
A. Word, number, or phrase
|
|
The plaintext encrypts to different cipher text with different keysThe plaintext encrypts to different cipher text with different keys
The answer is:
A. True
|
|
Conventional cryptography also known as ... encryptionConventional cryptography also known as ... encryption.
The answer is:
C. symmetric-key
|
|
The Data Encryption Standard (DES) is an example of aThe Data Encryption Standard (DES) is an example of a ...
The answer is:
A. Conventional cryptosystem
|
|
Public key cryptography is a ... cryptosystemPublic key cryptography is a ... cryptosystem
The answer is:
B. Asymmetric
|
|
Security Goals of Cryptography areSecurity Goals of Cryptography are
The answer is:
E. All of these
|
|
A process of studying cryptographic system is known as CryptanalysisA process of studying cryptographic system is known as Cryptanalysis
The answer is:
A. True
|
|
Cipher in cryptography is –Cipher in cryptography is –
The answer is:
B. Algorithm for performing encryption and decryption
|
|
The private key in asymmetric key cryptography is kept byThe private key in asymmetric key cryptography is kept by
The answer is:
B. Receiver
|
|
Which one of the following algorithms is not used in asymmetric-key cryptography?Which one of the following algorithms is not used in asymmetric-key cryptography?
The answer is:
B. Electronic code book algorithm
|
|
Which is the cryptographic protocol that is used to protect an HTTP connection?Which is the cryptographic protocol that is used to protect an HTTP connection?
The answer is:
C. TLS
|
|
A key is a value that works with a cryptographic algorithm to produce a specific cipher textA key is a value that works with a cryptographic algorithm to produce a specific cipher text.
The answer is:
A. True
|
|
A Public key size and conventional cryptography’s secret key size are closely related with one anotherA Public key size and conventional cryptography’s secret key size are closely related with one another.
The answer is:
B. False
|
|
ElGamal encryption system is an asymmetric key encryption algorithmElGamal encryption system is an asymmetric key encryption algorithm.
The answer is:
A. Public-key cryptography
|
MCQs
Views
Best Answers
Points