Q.1
"letters" has been encrypted with Caesar cipher to "cvkkvij". The key used was:
  • 16
  • 14
  • 18
  • 17
Q.2
Encrypted text that will appear to be a random string.
  • Encryption
  • Plaintext
  • Ciphertext
Q.3
It is a method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called dots and dashes or dits and dahs.
  • Caesar Cipher
  • Morse Code
  • Venn Diagram
Q.4
In software-based cryptography, software implementations can be easily reverse engineered.
  • TRUE
  • FALSE
Q.5
In software-based cryptography, it uses shared hardware, thus slower to execute.
  • TRUE
  • FALSE
Q.6
In hardware-based cryptography, it is dependent on the operating system.
  • TRUE
  • FALSE
Q.7
One key is used for data encryption and another for data decryption.
  • Symmetric Cryptosystem
  • Asymmetric Cryptosystem
  • Asymmetric Key
Q.8
The original message in its original legible form.
  • Ciphertext
  • Plaintext
  • Text Message
Q.9
It is pair of algorithms that take a key and convert plaintext to ciphertext andback.
  • Cryptosystem
  • Cryptography
  • Decryption
Q.10
It is a science that applies complexmathematics and logic to design strong encryptionmethods.
  • Cryptosystem
  • Cryptography
  • Encryption
Q.11
It is a value that is known to the sender.
  • Decryption Key
  • Encryption Key
  • PKI
Q.12
It is also called as private key cryptography.
  • Symmetric Cryptosystem
  • Asymmetric Cryptosystem
  • Decryption Key
Q.13
An electronic document that establishes your credentials when you are performing transactions.
  • Digital code
  • OTP
  • E-mail
  • Digital certificate
Q.14
Attack in which a user creates a packet that appears to be something else.
  • Smurfing
  • Trojan
  • E-mail bombing
  • Spoofing
Q.15
An encryption technique with 2 keys is ______________
  • Monoalphabetic Cipher
  • Cryptography
  • Private key cryptography
  • Public key cryptography
0 h : 0 m : 1 s