Here, we have a set of multiplechoice questions and answers (quiz) on cryptography basics (basic concepts of cryptography techniques).
Title  

Which of the following is not a type of symmetrickey cryptography technique?Which of the following is not a type of symmetrickey cryptography technique?
The answer is:
C. Diffie Hellman cipher


Which of the following is not a principle of data security?Which of the following is not a principle of data security?
The answer is:
D. None of the above


Which of the following security attacks is not an active attack? OR Which of the following attacks is a passive attack?Which of the following security attacks is not an active attack? OR Which of the following attacks is a passive attack?
The answer is:
D. Traffic analysis


Which of the following options correctly defines the Brute force attack?Which of the following options correctly defines the Brute force attack?
The answer is:
B. Trying every possible key to decrypt the message.


"A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?"A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?
The answer is:
D. All of the above


A mechanism used to encrypt and decrypt dataA mechanism used to encrypt and decrypt data.
The answer is:
A. Cryptography


To encrypt the plaintext, a cryptographic algorithm works in combination with a keyTo encrypt the plaintext, a cryptographic algorithm works in combination with a key...
The answer is:
A. Word, number, or phrase


The plaintext encrypts to different cipher text with different keysThe plaintext encrypts to different cipher text with different keys
The answer is:
A. True


Conventional cryptography also known as ... encryptionConventional cryptography also known as ... encryption.
The answer is:
C. symmetrickey


The Data Encryption Standard (DES) is an example of aThe Data Encryption Standard (DES) is an example of a ...
The answer is:
A. Conventional cryptosystem


Public key cryptography is a ... cryptosystemPublic key cryptography is a ... cryptosystem
The answer is:
B. Asymmetric


Security Goals of Cryptography areSecurity Goals of Cryptography are
The answer is:
E. All of these


A process of studying cryptographic system is known as CryptanalysisA process of studying cryptographic system is known as Cryptanalysis
The answer is:
A. True


Cipher in cryptography is –Cipher in cryptography is –
The answer is:
B. Algorithm for performing encryption and decryption


The private key in asymmetric key cryptography is kept byThe private key in asymmetric key cryptography is kept by
The answer is:
B. Receiver


Which one of the following algorithms is not used in asymmetrickey cryptography?Which one of the following algorithms is not used in asymmetrickey cryptography?
The answer is:
B. Electronic code book algorithm


Which is the cryptographic protocol that is used to protect an HTTP connection?Which is the cryptographic protocol that is used to protect an HTTP connection?
The answer is:
C. TLS


A key is a value that works with a cryptographic algorithm to produce a specific cipher textA key is a value that works with a cryptographic algorithm to produce a specific cipher text.
The answer is:
A. True


A Public key size and conventional cryptography’s secret key size are closely related with one anotherA Public key size and conventional cryptography’s secret key size are closely related with one another.
The answer is:
B. False


ElGamal encryption system is an asymmetric key encryption algorithmElGamal encryption system is an asymmetric key encryption algorithm.
The answer is:
A. Publickey cryptography

MCQs
Views
Best Answers
Points