MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Computer Science
Cryptography
Quiz 1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Q.1
What is encryption?
When you put data / text into code making it difficult to read or understand.
A secret or disguised way of writing; a code.
A formal language designed to communicate instructions to a machine
What is put in, taken in, or operated on by any process or system.
Q.2
Plaintext
original message
coded message
algorithm for transforming plaintext to ciphertext
info used in cipher known only to sender/receiver
Q.3
What does Firewall Do?
Prevents Hackers
Install Viruses
Give you SD cards
Blocks all content
Q.4
Encrypted text
Ciphertext
Plaintext
Algorithm
Cipher
Q.5
What alternative term can be used to describe asymmetric cryptographic algorithms?
public key cryptography
user key cryptography
private key cryptography
cipher-text cryptography
Q.6
DES follows
Hash Algorithm
Caesars Cipher
Feistel Cipher Structure
SP Networks
Q.7
Encrypt the word alphabet using a Caesar cipher with a shift of 3
DVSDULQV
DOOFOHDU
DOSKDEHW
DORQHBHV
Q.8
What is the term used to describe the science of making and breaking secret codes?
impersonation
factorization
jamming
cryptology
spoofing
Q.9
In Rotation Cipher, keyless rotation the number of rotations is
Jammed
Idle
Rotating
Fixed
Q.10
An encryption algorithm transforms plain text into:
Cipher text
Simple Text
Empty Text
Plain Text
Q.11
What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
symmetric
transposition
one-time pad
asymmetric
Q.12
Cryptography supports all of the core principles of information security except
Availability
Confidentiality
Integrity
Authenticity
Q.13
A Caesar cipher is an example of a ______________________.
transposition cipher
bimodal cipher
substitution cipher
substantial cipher
Q.14
What are three examples of administrative access controls? (Choose three.)
encryption
hiring practices
background checks
guard dogs
policies and procedures
Q.15
Which asymmetric algorithm provides an electronic key exchange method to share the secret key?
Diffie-Hellman
hashing
RSA
DES
WEP
Q.16
The two methods of encrypting data are?
Substitution and transposition
Block and stream
Symmetric and asymmetric
DES and AES
Q.17
In which type of encryption is the same key used to encrypt and decrypt data?
public
asymmetric
symmetric
private
Q.18
"CAESAR CIPHER" has been encrypted with Caesar cipher to "SQUIQH SYFXUH". The key used was:
16
14
13
12
Q.19
"CIPHERTEXT" has been encrypted with Caesar cipher to "EKRJGTVGZV". The key used was:
7
6
3
2
Q.20
"PLAINTEXT" has been encrypted with Caesar cipher to "AWLTYEPIE". The key used was:
16
12
11
19
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page