McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Uncategorized topics .
1. |
In symmetric-key cryptography, the key locks and unlocks the box is |
A. | same |
B. | shared |
C. | private |
D. | public |
Answer» A. same |
2. |
The keys used in cryptography are |
A. | secret key |
B. | private key |
C. | public key |
D. | all of them |
Answer» D. all of them |
3. |
Cryptography, a word with Greek origins, means |
A. | corrupting data |
B. | secret writing |
C. | open writing |
D. | closed writing |
Answer» B. secret writing |
4. |
A transposition cipher reorders (permutes) symbols in a |
A. | block of packets |
B. | block of slots |
C. | block of signals |
D. | block of symbols |
Answer» D. block of symbols |
5. |
Network Security provides authentication and access control for resources. |
A. | true |
B. | false |
Answer» A. true |
6. |
Which is not an objective of network security? |
A. | identification |
B. | authentication |
C. | access control |
D. | lock |
Answer» D. lock |
7. |
The process of verifying the identity of a user. |
A. | authentication |
B. | identification |
C. | validation |
D. | verification |
Answer» A. authentication |
8. |
Which of these is a part of network identification? |
A. | user id |
B. | password |
C. | otp |
D. | fingerprint |
Answer» A. user id |
9. |
The process of transforming plain text into unreadable text. |
A. | decryption |
B. | encryption |
C. | network security |
D. | information hiding |
Answer» B. encryption |
10. |
An algorithm used in encryption is referred to as cipher. |
A. | true |
B. | false |
Answer» A. true |
11. |
A process of making the encrypted text readable again. |
A. | decryption |
B. | encryption |
C. | network security |
D. | information hiding |
Answer» A. decryption |
12. |
A person who enjoys learning details about computers and how to enhance their capabilities. |
A. | cracker |
B. | hacker |
C. | app controller |
D. | site controller |
Answer» B. hacker |
13. |
A small program that changes the way a computer operates. |
A. | worm |
B. | trojan |
C. | bomb |
D. | virus |
Answer» D. virus |
14. |
An asymmetric-key (or public-key) cipher uses |
A. | 1 key |
B. | 2 key |
C. | 3 key |
D. | 4 key |
Answer» B. 2 key |
15. |
We use cryptofraphy term to transform messages to make them secure and immune to |
A. | change |
B. | idle |
C. | attacks |
D. | defend |
Answer» C. attacks |
16. |
In cryptography , the original message before being transformmed , is called |
A. | simple text |
B. | plain text |
C. | empty text |
D. | filled text |
Answer» B. plain text |
17. |
A straight permutation cipher or a straight p-box has the same number of input as |
A. | cipher |
B. | frames |
C. | outputs |
D. | bits |
Answer» C. outputs |
18. |
The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not |
A. | authenticated |
B. | joined |
C. | submit |
D. | separate |
Answer» A. authenticated |
19. |
Which of the following is not a transport layer vulnerability? |
A. | mishandling of undefined , poorly defined |
B. | the vulnerability that allows fingerprinting & other enumeration of host information |
C. | overloading of transporting layer mechanisms |
D. | unauthorized network access |
Answer» D. unauthorized network access |
20. |
Transmission mechanisms can be subject to spoofing & attacks based on skilled modified packets. |
A. | true |
B. | false |
Answer» A. true |
21. |
TCP/IP model does not have layer but OSI model have this layer. |
A. | session layer |
B. | transport layer |
C. | application layer |
D. | network layer |
Answer» A. session layer |
22. |
In cryptography, what is cipher? |
A. | algorithm for performing encrption and decryption |
B. | encrypted message |
C. | both algorith for performing encrption and decryption and encrypted message |
D. | decrypted message |
Answer» A. algorithm for performing encrption and decryption |
23. |
In cryptography, the order of the letters in a message is rearranged by |
A. | transpositional ciphers |
B. | substitution ciphers |
C. | both |
D. | quadratic ciphers |
Answer» A. transpositional ciphers |
24. |
What is data encryption standard (DES)? |
A. | block cipher |
B. | stream cipher |
C. | bit cipher |
D. | byte cipher |
Answer» A. block cipher |
25. |
Cryptanalysis is used |
A. | to find some insecurity in a cryptographic scheme |
B. | to increase the speed |
C. | to encrypt the data |
D. | to make new ciphers |
Answer» A. to find some insecurity in a cryptographic scheme |
26. |
Choose from among the following cipher systems, from best to the worst, with respect to ease of decryption using frequency analysis. |
A. | random polyalphabetic , plaintext , playfair |
B. | random polyalphabetic , playfair , vignere |
C. | random polyalphabetic , vignere , playfair , plaintext |
D. | random polyalphabetic , plaintext , beaufort , playfair |
Answer» C. random polyalphabetic , vignere , playfair , plaintext |
27. |
On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword “HUMOR” we get cipher text- |
A. | abqdnwewuwjphfvrrtrfzn sdokvl |
B. | abqdvmwuwjphfvvyyrf znydokvl |
C. | tbqyrvmwuwjphfvvyy rfznydokvl |
D. | baiuvmwuwjphfoeiyrf znydokvl |
Answer» B. abqdvmwuwjphfvvyyrf znydokvl |
28. |
. Rail Fence Technique is an example of |
A. | substitution |
B. | transposition |
C. | product cipher |
D. | ceaser cipher |
Answer» B. transposition |
29. |
Public key encryption is advantageous over Symmetric key Cryptography because of |
A. | speed |
B. | space |
C. | key exchange |
D. | key length |
Answer» C. key exchange |
30. |
The sub key length at each round of DES is |
A. | 32 |
B. | 56 |
C. | 48 |
D. | 64 |
Answer» B. 56 |
31. |
Which one is the strong attack mechanism? |
A. | chosen plaintext attack |
B. | chosen cipher text |
C. | brute force attack |
D. | man in the middle attack |
Answer» C. brute force attack |
32. |
Interception is an attack on |
A. | availability |
B. | confidentiality |
C. | integrity |
D. | authenticity |
Answer» B. confidentiality |
33. |
Chosen cipher text attack is based on |
A. | cryptanalysis |
B. | cryptography |
C. | encryption |
D. | decryption |
Answer» A. cryptanalysis |
34. |
The process of writing the text as rows and read it as columns is known as |
A. | vernam cipher |
B. | ceaser cipher |
C. | transposition columnar cipher |
D. | homophonic substitution cipher |
Answer» C. transposition columnar cipher |
35. |
Biometric authentication works on the basis of |
A. | human characteristics |
B. | passwords |
C. | smart cards |
D. | pin |
Answer» A. human characteristics |
36. |
Which layer filters the proxy firewall? |
A. | application |
B. | network |
C. | transport |
D. | none of the above |
Answer» A. application |
37. |
Encryption Strength is based on |
A. | strength of algorithm |
B. | secrecy of key |
C. | length of key |
D. | all of the above |
Answer» D. all of the above |
38. |
GCD(a,b) = GCD(b,a mod b) |
A. | true |
B. | false |
C. | cannot be determined |
D. | none |
Answer» A. true |
39. |
All groups satisfy properties |
A. | g-i to g-v |
B. | g-i to g-iv |
C. | g-i to r-v |
D. | r-i to r-v |
Answer» C. g-i to r-v |
40. |
An Abelian Group satisfies the properties |
A. | g-i to g-v |
B. | g-i to g-iv |
C. | g-i to r-v |
D. | r-i to r-v |
Answer» A. g-i to g-v |
41. |
A Ring satisfies the properties |
A. | r-i to r-v |
B. | g-i to g-iv |
C. | g-i to r-v |
D. | g-i to r-iii |
Answer» D. g-i to r-iii |
42. |
A Ring is said to be commutative if it also satisfies the property |
A. | r-vi |
B. | r-v |
C. | r-vii |
D. | r-iv |
Answer» D. r-iv |
43. |
An ‘Integral Domain’ satisfies the properties |
A. | g-i to g-iii |
B. | g-i to r-v |
C. | g-i to r-vi |
D. | g-i to r-iii |
Answer» C. g-i to r-vi |
44. |
Does the set of residue classes (mod 3) form a group with respect to modular addition? |
A. | yes |
B. | no |
C. | can\t say |
D. | insufficient data |
Answer» A. yes |
45. |
For the group Sn of all permutations of n distinct symbols, what is the number of elements in Sn? |
A. | n |
B. | n-1 |
C. | 2n |
D. | n! |
Answer» D. n! |
46. |
a(b+c) = ac+bc is the representation for which property? |
A. | g-ii |
B. | g-iii |
C. | r-ii |
D. | r-iii |
Answer» D. r-iii |
47. |
a.(b.c) = (a.b).c is the representation for which property? |
A. | g-ii |
B. | g-iii |
C. | r-ii |
D. | r-iii |
Answer» A. g-ii |
48. |
AES uses a bit block size and a key size of bits. |
A. | 128; 128 or 256 |
B. | 64; 128 or 192 |
C. | 256; 128, 192, or 256 |
D. | 128; 128, 192, or 256 |
Answer» D. 128; 128, 192, or 256 |
49. |
Like DES, AES also uses Feistel Structure. |
A. | true |
B. | false |
C. | cannot be determined |
D. | none |
Answer» B. false |
50. |
Which one of the following is not a cryptographic algorithm? |
A. | jupiter |
B. | blowfish |
C. | serpent |
D. | none |
Answer» A. jupiter |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.