MCQ Mojo
access_time
menu
Quiz
Web Stories
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
Quiz
Quiz
/
Codes, Secrets, and Ciphers Quiz
1.
The term
cryptology
comes from two words, meaning “hidden” and “word,” in what language?
Greek
Latin
Sumerian
Phoenician
2.
What is the digraph substitution cipher cracked by Lord Peter Wimsey and Harriet Vane in Dorothy L. Sayers’s book
Have His Carcase
?
Playfair
Polymath
Turnaround
Misdirection
3.
Who invented a type of simple polyalphabetic cipher that was once thought to be impregnable and hence was nicknamed “the indecipherable cipher”?
Mariton DeVille
Thierry Lance-Pierres
Giovan Battista Bellaso
Paolo Veight Neuf
4.
What is the best-known public-key scheme cryptoalgorithm?
CST
PQ2
MIR
RSA
5.
What militaristic people employed a cipher device called the scytale for secret communication between army commanders as early as 400 BCE?
Scythians
Phoenicians
Spartans
Thracians
6.
Who were the inventors of the first transposition cipher?
Copts
Babylonians
Greeks
Egyptians
7.
During the 4th century BCE who wrote
On the Defense of Fortifications
, one chapter of which was devoted to cryptography?
Aeneas Tacticus
Damokles Kadmos
Alejandro Makarios
Agafya Chariton
8.
Which Greek inventor devised a means of encoding letters into pairs of symbols by using a device named after him?
Photine
Militades
Tryphaina
Polybius
9.
Which ancient Roman cipher, using monoalphabetic substitution with a simple cyclic displacement of the alphabet, was named after a famous general and statesman?
Tiberius cipher
Caesar cipher
Hadrian cipher
Vespasian cipher
10.
HAL, the computer in the film
2001: A Space Odyssey
(1968), encrypts to IBM using the cipher of which Roman emperor?
Claudius
Augustus
Galba
Nero
11.
About 1412 which Egyptian scholar discussed several cryptographic systems in his encyclopaedia,
Ṣubīal-aīshī
?
ʿAbd al-Raḩmān
Iliya Abu Madi
Abd al-Aziz
al-Kalka-shandī
12.
Who authored the first European manual on cryptography (c. 1379), a compilation of ciphers that contains a set of keys for 24 correspondents as well as symbols for letters, nulls, and several two-character code equivalents for words and names?
Gabriele de Lavinde of Parma
Giletto Fiume of Narbona
Archangelo Girlani of Tuscany
Carmelo Grifone of Godego
13.
Who wrote in 1466 or 1467 the treatise "De componendis cyfris" (Latin: "On Writing in Ciphers"), which presented the first polyalphabetic cipher?
Giacomo Pier Longo
Maggiore Rienzi
Roberto D’Annunzio
Leon Battista Alberti
14.
What is the famous unsolved book cipher that purports to give the location of a buried treasure in Bedford county, Virginia?
Thurston cipher
Murdoch cipher
Willingham cipher
Beale cipher
15.
Who was the chief codebreaker for British commander Arthur Wellesley, later 1st duke of Wellington, during the Peninsular War (1808–14)?
George Scovell
Josephy Pilkington
Thomas Burwell
Ernest Rillington
16.
What was the brand name for a famous series of innovative electro-mechanical devices used by the German military during World War II to encode and decode its top-secret radio traffic?
Mesmer
Enigma
Proteus
Wormwood
17.
What early electronic computer, invented by Royal Post Office engineer Tommy Flowers, was used to decipher complexly encoded teleprinter messages from Hitler and the German High Command, enabling the Allies to eavesdrop on the Germans before D-Day?
Gargantua
Colossus
Polemic
Pegasus
18.
What algorithm, submitted by IBM, became the Data Encryption Standard (DES) for the U.S. National Bureau of Standards in 1975?
Archangel
Lucifer
Plato
Copernicus
19.
Which Native American language was used by U.S. Army units during World War I to transmit secret tactical messages and proved instrumental in a successful surprise attack against the Germans?
Choctaw
Ute
Haida
Miami
20.
What code did Napoleon and his officers begin using in 1811 after their previous code was broken by British Army Major George Scovell?
Moulton Cipher
Voltaire Cipher
Great Paris Cipher
Hapsburg Cipher
21.
What late 18th-century code, deciphered only in 2011, was used to mask a text describing a ritual of a secret society that apparently had a fascination with eye surgery and ophthalmology?
Newscombe Cipher
Giordano Cipher
Carmelo Cipher
Copiale Cipher
22.
What is the name of an extraordinary codex from the 15th or 16th century that is filled with bizarre illustrations and text in a unique alphabet that no one has ever deciphered?
Priory Manuscript
Friars Manuscript
Pancelli Manuscript
Voynich Manuscript
23.
What is the name of the eight-letter carving of unknown meaning inscribed into the Shepherd’s Monument in Staffordshire, England?
Shugborough Inscription
Wilsmore Carving
Martell Notation
Partington Letters
Report Question
Previous
Next
warning
Submit
access_time
Time
Report Question
A bunch of text
Support mcqmojo.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page