MCQ Mojo
access_time
menu
Quiz
Web Stories
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
Quiz
Quiz
/
Cryptography Class 10 MCQ Questions With Answers
1.
Key
algorithm for transforming plaintext to ciphertext
info used in cipher known only to sender/receiver
•recovering ciphertext from plaintext
•converting plaintext to ciphertext
2.
Each of these words corresponding to the given numbers below.KEP, TET, PEK, KET, TEK.Find TEK!
203
101
201
102
302
3.
Authentication
Ensure message remains secret during transmission between parties
Ensure message is not altered while in transit between communicating partners
Verifies sender is who she says she is
Proves that nobody but on sender could have sent a particular message
4.
Cipher
•study of principles/methods of deciphering ciphertext without knowing key
•converting plaintext to ciphertext
•coded message
algorithm for transforming plaintext to ciphertext
5.
In Cryptography the character sequence that you believe you know is called:
crib
key
guess
plaintext
6.
Each of these words corresponding to the given figures below.YAPI, KIYI, KAZI, YAZI, SARI.Find KAZI!
Π∇ΩΘ\Pi\nabla\Omega\ThetaΠ∇ΩΘ
Λ∇OΘ\Lambda\nabla O\ThetaΛ∇OΘ
Σ∇ΩΘ\Sigma\nabla\Omega\ThetaΣ∇ΩΘ
ΣΘΠΘ\Sigma\Theta\Pi\ThetaΣΘΠΘ
Π∇ΞΘ\Pi\nabla\Xi\ThetaΠ∇ΞΘ
7.
The art and science of breaking the cipher text is known as
Cryptanalysis
Cryptography
Staganography
Watermarking
8.
Who was the first know user of the Caesar Cipher?
Caesar Romanus
Julius Caesar
Alan Turing
There isn't one
9.
Document containing only text
Ciphertext
Cipher
Plaintext
Algorithm
10.
Shifting letters around to make text unreadable known as cryptographic algorithms is referred to as
Sifr
Cipher
Encryption
Plaintext
11.
Decipher
original message
algorithm for transforming plaintext to ciphertext
recovering plaintext from ciphertext
•field of both cryptography and cryptanalysis
12.
This is a mathematical procedure for performing encryption
Cipher
Algorithm
Substitution
Transposition
13.
Encrypted text
Ciphertext
Plaintext
Algorithm
Cipher
14.
Cipher based on substitution, using multiple substitution alphabets is called:
Polyalphabetic cipher
Monoalphabetic cipher
Polycipher
Monocipher
15.
Tick all examples of Monoaplhabetic Ciphers:
Caesar-shift cipher
Vigenere Cipher
Keypad Cipher
Morse Code Cipher
16.
Each of these words corresponding to the given numbers below.CBCBC, FDFDF, ESESE, BABAB, DCDCD.Find ESESE!
51515
65656
42424
30303
13131
17.
Each of these words corresponding to the given numbers below. KAYGU, BAKAN, BENAN, DUYGU, YAKUP.Find KAYGU!
42532
10797
69532
19697
59628
18.
Each of these words corresponding to the given numbers below.TAKI, KAYA, YAKI, AKIL, YAKA.Find YAKI!
4957
9578
5949
4959
3957
19.
This method of encryption is the replacement of an item with a different item.
Transposition
Confusion
Substitution
Diffusion
20.
Confidentiality
Ensure message remains secret during transmission between parties
Ensure message is not altered while in transit between communicating partners
Verifies sender is who she says she is
Proves that nobody but on sender could have sent a particular message
21.
This is as set of possible key values for an algorithm
Work Factor
Cipher
Keyspace
Keyfactor
22.
Encipher
converting plaintext to ciphertext
coded message
•study of principles/methods of deciphering ciphertext without knowing key
study of encryption principles/methods
23.
Cryptography is the science of encrypting or hiding information.
True
False
24.
What is the name of the electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during WWII?
Bomba
Bomby
Bombe
Bomb
25.
Integrity
Ensure message remains secret during transmission between parties
Ensure message is not altered while in transit between communicating partners
Verifies sender is who she says she is
Proves that nobody but on sender could have sent a particular message
26.
In Cryptography, original message, before being transformed, is called
Simple Text
Plain Text
Cipher Text
Filled Text
27.
Each of these words corresponding to the given figures below.KERE, KARA, ARSA, SARA, FARE.Find ARSA!
∇×Π∇\nabla\times\Pi\nabla∇×Π∇
Θ∨×∨\Theta\vee\times\veeΘ∨×∨
+∇×∨+\nabla\times\vee+∇×∨
Π∇×∇\Pi\nabla\times\nablaΠ∇×∇
Θ∇×∇\Theta\nabla\times\nablaΘ∇×∇
28.
Each of these words corresponding to the given numbers below.HILAL, SILAH, DELIL, HITIT, LAHIT.Find LAHIT!
93425
42531
53131
76434
53424
29.
Study of letters or groups of letters contained in a ciphertext in an attempt to partially reveal the message is called:
Frequency analysis
Cryptography
Encription
Decription
30.
Each of these numbers corresponding to the given words below.523, 123, 526, 423, 623.Find 623!
SEL
SEK
TEL
YEL
KEL
Report Question
Previous
Next
warning
Submit
access_time
Time
Report Question
A bunch of text
Support mcqmojo.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page