1. Which one is DES?
a) Block cipher
b) Bit cipher
c) Stream cipher
d) None of the above
2. An
asymmetric-key cipher uses
a) 1 Key
b) 2 Key
c) 3 Key
d) 4 Key
3. Cryptography term is used to transforming
messages to make them secure and to prevent from
a) Change
b) Defend
c) Idle
d) Attacks
4. Shift
cipher is also referred to as the
a) Caesar cipher
b) cipher
text
c) Shift
cipher
d) None of
the above
5. Which one is the Heart of Data Encryption Standard (DES)?
a) DES function
b) Encryption
c) Rounds
d) Cipher
6. DES stands for…………………
a) Data Encryption Slots
b) Data Encryption Subscription
c) Data Encryption Standard
d) Data Encryption
Solutions
7. What is cipher in Cryptography?
a) Algorithm for performing
encryption
b) Algorithm for performing decryption
c) Encrypted Messages
d) Both algorithm for performing encryption and Decryption
and encrypted message
8. In
cryptography, the original message before being transformed, is
a) Simple
Text
b) Cipher
Text
c) Empty
Text
d) plain text
9. Which of these is a technique that is used to verify a message’s
integrity?
a) Message Digest
b) Protocol
c) Decryption algorithm
d) Digital signature
10. Using the cipher algorithm, which of these types of text would be
transformed?
a) Plain text
b) Scalar text
c) Complex text
d) Transformed text
11. Which of these is NOT involved in the CIA Triad?
a) Confidentiality
b) Availability
c) Integrity
d) Authenticity
12. ECB in the context of digital cryptography
stands for
a) Electrical Circuit Board
b) Electronic Code Book
c) Electrical Code Book
d) Electronic Circuit Book
13. Which of the following statements describe a
type of Phishing attack?
a) Sending someone an email
that contains a malicious link by disguising to appear like an email from
someone the person knows.
b) Creating a fake website
that appears to be identical to the real website and trick users to
enter their login information
c) Sending someone a text
message that contains a malicious link that is disguised to look like a
notification that the person has won a contest.
d) All of the above
14. Which one of the
following techniques used by hackers to trick the users in order to disclose
their username and passwords through fake websites?
a) Social Engineering
b) Cookie stealing
c) Phishing
d) Cyber stalking
15. The encryption technique that uses one message to hide another message is called
a) MDA
b) Hashing
c) Steganography
d) None of the above
16. ________ is the term used in computer security to
protect your data from getting disclosed.
a) Integrity
b) Authentication
c) Confidentiality
d) Availability
17. ___________ is the
term used in computer security to protect the data from being modified by the
unauthorized user.
a) Integrity
b) Authentication
c) Confidentiality
d) Availability
18. Which algorithm can ensure data integrity?
a) RSA
b) AES
c) MD5
d) PKI
19. What is the keyspace of an
encryption algorithm?
a) the set of all possible values used to generate a key
b) the set of procedures
used to calculate asymmetric keys
c) the set of hash
functions used to generate a key
d) the mathematical
equation that is used to create a key
20. Alice and Bob are using a digital signature to sign a document. What key
should Alice use to sign the document so that Bob can make sure that the
document came from Alice?
a) private key from Bob
b) private key from Alice
c) public key from Bob
d) username and password
from Alice
21. Which three security services are provided by
digital signatures? (Choose
three.)
a) provides non-repudiation
using HMAC functions
b) guarantees data has not changed in transit
c) provides data encryption
d) authenticates the source
e) provides
confidentiality of digitally signed data
f) authenticates the destination
22. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) to make new ciphers
23. What is data encryption standard (DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) byte cipher
24. In cryptography, the order of the letters in a message is rearranged by
a) transposition ciphers
b) substitution ciphers
c) both
d) quadratic ciphers
25. In cryptography, what is cipher?
a) algorithm for performing encryption
and decryption
b) encrypted message
c) both algorithm for performing encryption and decryption and encrypted
message
d) decrypted message
26. The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not
a) Authenticated
b) Joined
c) Submit
d) Separate
27. A straight permutation cipher or a straight p-box has the same number of input as
a) Cipher
b) Frames
c) Outputs
d) Bits
28. A person who enjoys learning details about computers and how to enhance their capabilities.
a) Cracker
b) Hacker
c) app controller
d) site controller
29. A process of making the encrypted text readable again.
a) Decryption
b) Encryption
c) network security
d) information hiding
30. The process of transforming plain text into unreadable text.
a) Decryption
b) Encryption
c) network security
d) information hiding
31. A transposition cipher reorders (permutes) symbols in a
a) block of packets
b) block of slots
c) block of signals
d) block of symbols
32. Cryptography, a word with Greek origins, means
a) corrupting data
b) secret writing
c) open writing
d) closed writing
33. In public key cryptosystem __keys are used for encryption and decryption.
a) Same
b) Different
c) encryption keys
d) none of the mentioned
34. In RSA, Ф(n) = in terms of p and q
a) (p)/(q)
b) (p)(q)
c) (p-1)(q-1)
d) (p+1)(q+1)
35. For RSA to work, the value of P must be less than the value of
a) P
b) Q
c) N
d) F
36. In Asymmetric key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
a) Short
b) Long
c) Flat
d) Thin
37. Which of the following is not a type of symmetric-key cryptography technique?
a) caesar cipher
b) data encryption standard (des)
c) diffie hellman cipher
d) playfair cipher
38. Computation of the discrete logarithm is the basis of the cryptographic system
a) symmetric cryptography
b) asymmetric cryptography
c) diffie-hellman key exchange
d) secret key cryptography
39. Which of the following is a mode of operation for the Block ciphers in cryptography?
a) electronic code book (ecb)
b) cipher block chaining (cbc)
c) counter (ctr) mode
d) all of the above
40. The DES algorithm has a key length of
a) 128 bits
b) 32 bits
c) 64 bits
d) 16 bits
41. The number of unique substitution boxes in DES after the 48 bit XOR operation are
a) 8
b) 4
c) 6
d) 12
42. The Initial Permutation table/matrix is of size
a) 16×8
b) 4×8
c) 12×8
d) 8×8
43. DES follows
a) hash algorithm
b) caesars cipher
c) feistel cipher structure
d) sp networks
44. The DES Algorithm Cipher System consists of ____rounds (iterations) each with a round key.
a) 9
b) 12
c) 18
d) 16
45. For the AES-128 algorithm there are __ similar rounds and __ round is different.
a) 2 pair of 5 similar rounds ; every alternate
b) 9 ; the last
c) 8 ; the first and last
d) 10 ; no
46. The 4×4 byte matrices in the AES algorithm are called
a) States
b) Words
c) Transitions
d) Permutations
47. AES uses a ___ bit block size and a key size of _______ bits.
a) 128; 128 or 256
b) 64; 128 or 192
c) 256; 128, 192, or 256
d) 128; 128, 192, or 256
48. The process of writing the text as rows and read it as columns is known as
a) vernam cipher
b) ceaser cipher
c) transposition columnar cipher
d) homophonic substitution cipher
49. Chosen cipher text attack is based on
a) Cryptanalysis
b) Cryptography
c) Encryption
d) Decryption
50. Rail Fence Technique is an example of
a) Substitution Cipher
b) Transposition Cipher
c) product cipher
d) ceaser cipher
51. Public key encryption is advantageous over Symmetric key Cryptography because of
a) Speed
b) Space
c) key exchange
d) key length
52. The sub key length at each round of DES is
a) 32
b) 56
c) 48
d) 64
0 Comments
if you have any doubts plz let me know...