MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Digital Communications
Basic Digital Communications
Quiz 1
1
2
3
4
5
6
7
8
9
10
11
12
13
Q.1
Which should be kept as a secret in public key cryptosystem?
a) Encryption key
b) Decryption key
c) Encryption & Decryption key
d) None of the mentioned
Q.2
Cipher system can be solved effectively by statistically using
a) Time of occurrence
b) Frequency of occurrence
c) Length of the message
d) None of the mentioned
Q.3
Encryption transformations are known as
a) Diffusion
b) Confusion
c) Diffusion & Confusion
d) None of the mentioned
Q.4
For n input bits the number of substitution patterns are
a) 2n
b) (2n)!
c) 1/2n!
d) 2n!
Q.5
In transposition, the plaintext letters are
a) Substituted
b) Rearranged
c) Removed
d) None of the mentioned
Q.6
The substitution of the letters are done
a) Serially
b) Parallel way
c) Serially & Parallel way
d) None of the mentioned
Q.7
In cipher feedback method, encryption is done on
a) Single individual bits
b) Characters
c) Single individual bits & Characters
d) None of the mentioned
Q.8
In stream encryption, the key sequence repeats itself.
a) True
b) False
Q.9
In which method, key-stream is generated independently?
a) Synchronous
b) Self synchronous
c) Synchronous & Self synchronous
d) None of the mentioned
Q.10
Synchronous ciphers uses
a) Confusion
b) Diffusion
c) Confusion & Diffusion
d) None of the mentioned
Q.11
Public key cryptosystem uses same key for both encryption and decryption.
a) True
b) False
Q.12
Public key cryptosystem is also known as
a) One way function
b) Two way function
c) Feedback function
d) None of the mentioned
Q.13
Euler’s totient function is determined by
a) pq
b) (p-1)(q-1)
c) (p+1)(q+1)
d) p/q
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)