Cryptography and Network Security MCQ | Cryptography and Network Security MCQ and Answers



1. Which one is DES?

a)  Block cipher

b)  Bit cipher

c)  Stream cipher

d) None of the above

 

2. An asymmetric-key cipher uses


a)  1 Key

b)  2 Key

c)  3 Key

d)  4 Key

 

3. Cryptography term is used to transforming messages to make them secure and to prevent from

a)  Change

b)  Defend

c)  Idle

d) Attacks

 

4. Shift cipher is also referred to as the


a)  Caesar cipher

b)  cipher text

c)  Shift cipher

d) None of the above

 

5.  Which one is the Heart of Data Encryption Standard (DES)?

a)  DES function

b)  Encryption

c)  Rounds

d) Cipher

 

6. DES stands for…………………


a)  Data Encryption Slots

b)  Data Encryption Subscription

c)  Data Encryption Standard

d) Data Encryption Solutions


7.  What is cipher in Cryptography?


a)  Algorithm for performing encryption

b)  Algorithm for performing decryption

c)  Encrypted Messages

d) Both algorithm for performing encryption and Decryption and encrypted message

 

8. In cryptography, the original message before being transformed, is


a)  Simple Text

b)  Cipher Text

c)  Empty Text

d)  plain text

 

9. Which of these is a technique that is used to verify a message’s integrity?


a)  Message Digest

b)  Protocol

c)  Decryption algorithm

d) Digital signature

 

10. Using the cipher algorithm, which of these types of text would be transformed?


a)  Plain text

b)  Scalar text

c)  Complex text

d) Transformed text

 

11. Which of these is NOT involved in the CIA Triad?


a)  Confidentiality

b)  Availability

c)  Integrity

d) Authenticity

 

 

 

12. ECB in the context of  digital cryptography stands for


a)  Electrical Circuit Board

b)  Electronic Code Book

c)  Electrical Code Book

d) Electronic Circuit Book

 

13. Which of the following statements describe a type of Phishing attack?


a)  Sending someone an email that contains a malicious link by disguising to appear like an email from someone the person knows.

b)  Creating a fake website that appears to be identical to the  real website and  trick users to enter  their login information

c)  Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest.

d) All of the above

 

14. Which one of the following techniques used by hackers to trick the users in order to disclose their username and passwords through fake websites? 


a)  Social Engineering

b)  Cookie stealing

c)  Phishing

d) Cyber stalking

 

15. The encryption technique that uses one message to hide another message is called 


a)  MDA 

b)  Hashing

c)  Steganography

d) None of the above

 

16. ________  is the term used in computer security to protect your data from getting disclosed.


a)  Integrity 

b)  Authentication

c)  Confidentiality

d) Availability

 

17.  ___________ is the term used in computer security to protect the data from being modified by the unauthorized user.


a)  Integrity

b)  Authentication

c)  Confidentiality

d) Availability

 

18. Which algorithm can ensure data integrity?


a)  RSA

b)  AES

c)  MD5

d) PKI

 

19. What is the keyspace of an encryption algorithm?


a)  the set of all possible values used to generate a key

b)  the set of procedures used to calculate asymmetric keys

c)  the set of hash functions used to generate a key

d) the mathematical equation that is used to create a key


 

20. Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?


         a)  private key from Bob

         b)  private key from Alice

          c)  public key from Bob

          d) username and password from Alice

 

21. Which three security services are provided by digital signatures? (Choose three.)


        a)  provides non-repudiation using HMAC functions

        b)  guarantees data has not changed in transit

        c)   provides data encryption

        d) authenticates the source

        e)  provides confidentiality of digitally signed data

        f)   authenticates the destination

 

22. Cryptanalysis is used      

        a)    to find some insecurity in a cryptographic scheme  

        b)   to increase the speed

        c)   to encrypt the data

        d) to make new ciphers

 

23. What is data encryption standard (DES)?

        a)  block cipher

        b)  stream cipher

        c)  bit cipher

        d) byte cipher

 

24. In cryptography, the order of the letters in a message is rearranged by

        a)  transposition ciphers

        b)  substitution ciphers

        c)  both

        d) quadratic ciphers

 

25. In cryptography, what is cipher?

        a)  algorithm for performing encryption and decryption

        b)  encrypted message

        c)  both algorithm for performing encryption and decryption and encrypted message

        d) decrypted message

 

26. The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not

a)  Authenticated

b)  Joined

c)  Submit

d) Separate

 

27. A straight permutation cipher or a straight p-box has the same number of input as

        a)  Cipher

        b)  Frames

        c)  Outputs

        d) Bits

 

28. A person who enjoys learning details about computers and how to enhance their capabilities.

        a)  Cracker

        b)  Hacker

        c)  app controller

        d) site controller

 

29. A process of making the encrypted text readable again.

        a)  Decryption

        b)  Encryption

        c)  network security

        d) information hiding

 

30. The process of transforming plain text into unreadable text.

        a)  Decryption

        b)  Encryption

        c)  network security

        d) information hiding

 

31. A transposition cipher reorders (permutes) symbols in a

        a)  block of packets

        b)  block of slots

        c)  block of signals

        d) block of symbols

 

32. Cryptography, a word with Greek origins, means

        a)  corrupting data

        b)  secret writing

        c)  open writing

        d) closed writing

 

33. In public key cryptosystem __keys are used for encryption and decryption.

        a)  Same

        b)  Different

        c)  encryption keys

        d) none of the mentioned

 

34. In RSA, Ф(n) = in terms of p and q

        a)  (p)/(q)

        b)  (p)(q)

        c)  (p-1)(q-1)

        d) (p+1)(q+1)

 

35. For RSA to work, the value of P must be less than the value of 

        a)  P

        b)  Q

        c)  N

        d) F

 

36. In Asymmetric key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

        a)  Short

        b)  Long

        c)  Flat

        d) Thin 

 

37. Which of the following is not a type of symmetric-key cryptography technique?

        a)  caesar cipher

        b)  data encryption standard (des)

        c)  diffie hellman cipher

        d) playfair cipher

 

38. Computation of the discrete logarithm is the basis of the cryptographic system

        a)  symmetric cryptography

        b)  asymmetric cryptography

        c)  diffie-hellman key exchange

        d) secret key cryptography

 

39. Which of the following is a mode of operation for the Block ciphers in cryptography?

        a)  electronic code book (ecb)

        b)  cipher block chaining (cbc)

        c)  counter (ctr) mode

        d) all of the above

 

40. The DES algorithm has a key length of

        a)  128 bits

        b)  32 bits

        c)  64 bits

        d) 16 bits

 

41. The number of unique substitution boxes in DES after the 48 bit XOR operation are

        a)  8

        b)  4

        c)  6

        d)  12


42. The Initial Permutation table/matrix is of size 

        a)  16×8

        b)  4×8

        c)  12×8

        d) 8×8

 

43. DES follows  

        a)  hash algorithm

        b)  caesars cipher

        c)  feistel cipher structure

        d) sp networks

 

44. The DES Algorithm Cipher System consists of ____rounds (iterations) each with a round key. 

        a)  9

        b)  12

        c)  18

        d) 16

 

45. For the AES-128 algorithm there are __ similar rounds and __ round is different.

        a)  2 pair of 5 similar rounds ; every alternate

        b)  9 ; the last

        c)  8 ; the first and last

        d) 10 ; no

 

46. The 4×4 byte matrices in the AES algorithm are called

a)  States

b)  Words

c)  Transitions

d) Permutations

  

47. AES uses a ___ bit block size and a key size of  _______ bits.

        a)  128; 128 or 256

        b)  64; 128 or 192

        c)  256; 128, 192, or 256

        d) 128; 128, 192, or 256

 

48. The process of writing the text as rows and read it as columns is known as

         a)  vernam cipher

        b)  ceaser cipher    

        c)  transposition columnar cipher

        d)  homophonic substitution cipher

 

49. Chosen cipher text attack is based on

        a)  Cryptanalysis

        b)  Cryptography

        c)  Encryption

        d) Decryption

 

50. Rail Fence Technique is an example of

        a)  Substitution Cipher

        b)  Transposition Cipher

        c)  product cipher

        d) ceaser cipher

 

51. Public key encryption is advantageous over Symmetric key Cryptography because of 

        a)  Speed

        b)  Space

        c)  key exchange

        d) key length

 

52. The sub key length at each round of DES is 

        a)  32

        b)  56

        c)  48

        d) 64

 

 

Post a Comment

0 Comments