MCQ Mojo
access_time
menu
Quiz
Web Stories
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
CBSE
arrow_drop_down
MCQ Questions for CBSE Class 12 with Answers
MCQ Questions for CBSE Class 11 with Answers
MCQ Questions for CBSE Class 10 with Answers
MCQ Questions for CBSE Class 9 with Answers
MCQ Questions for CBSE Class 8 with Answers
MCQ Questions for CBSE Class 7 with Answers
MCQ Questions for CBSE Class 6 with Answers
MCQ Questions for CBSE Class 5 with Answers
MCQ Questions for CBSE Class 4 with Answers
MCQ Questions for CBSE Class 3 with Answers
MCQ Questions for CBSE Class 2 with Answers
MCQ Questions for CBSE Class 1 with Answers
Quiz
Quiz
/
Cryptography Gate & PSU MCQ Questions With Answers
1.
Cryptanalysis
field of both cryptography and cryptanalysis
study of encryption principles/methods
study of principles/methods of deciphering ciphertext without knowing key
converting plaintext to ciphertext
2.
In which type of encryption is the same key used to encrypt and decrypt data?
public
asymmetric
symmetric
private
3.
It is a science that applies complexmathematics and logic to design strong encryptionmethods.
Cryptosystem
Cryptography
Encryption
4.
Plaintext
original message
coded message
algorithm for transforming plaintext to ciphertext
info used in cipher known only to sender/receiver
5.
Cryptography
study of principles/methods of deciphering ciphertext without knowing key
study of encryption and decryption principles and methods
field of both cryptography and cryptanalysis
coded message
6.
A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?
detective
preventive
masking
deterrent
7.
One key is used for data encryption and another for data decryption.
Symmetric Cryptosystem
Asymmetric Cryptosystem
Asymmetric Key
8.
Non-repudiation
Ensure message remains secret during transmission between parties
Ensure message is not altered while in transit between communicating partners
Verifies sender is who she says she is
Proves that nobody but on sender could have sent a particular message
9.
The two methods of encrypting data are?
Substitution and transposition
Block and stream
Symmetric and asymmetric
DES and AES
10.
Data that is in an unencrypted form is referred to as which of the following?
plain text
crypt text
cleartext
simpletext
11.
Encrypted text that will appear to be a random string.
Encryption
Plaintext
Ciphertext
12.
What are three examples of administrative access controls? (Choose three.)
encryption
hiring practices
background checks
guard dogs
policies and procedures
13.
It is pair of algorithms that take a key and convert plaintext to ciphertext andback.
Cryptosystem
Cryptography
Decryption
14.
Cryptography supports all of the core principles of information security except
Availability
Confidentiality
Integrity
Authenticity
15.
What alternative term can be used to describe asymmetric cryptographic algorithms?
public key cryptography
user key cryptography
private key cryptography
cipher-text cryptography
16.
The only cipher system said to be unbreakable by brute force is
AES
DES
One-time pad
Triple DES
17.
What type of cryptography uses two keys on both ends i.e a private and a public key?
shared
asymmetric
symmetric
open
18.
It is also called as private key cryptography.
Symmetric Cryptosystem
Asymmetric Cryptosystem
Decryption Key
19.
It is a method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called dots and dashes or dits and dahs.
Caesar Cipher
Morse Code
Venn Diagram
20.
What is an important disadvantage of using a public key algorithm compared to a symmetric algorithm?
Asymmetric algorithm provides better access control.
Asymmetric algorithm is a faster process.
Asymmetric algorithm provides nonrepudiation of delivery.
Asymmetric algorithm is more difficult to implement.
21.
Which three processes are examples of logical access controls? (Choose three.)
swipe cards to allow access to a restricted area
biometrics to validate physical characteristics
firewalls to monitor traffic
intrusion detection system (IDS) to watch for suspicious network activity
fences to protect the perimeter of a building
22.
Cryptology
coded message
original message
recovering ciphertext from plaintext
field of both cryptography and cryptanalysis
23.
In software-based cryptography, software implementations can be easily reverse engineered.
TRUE
FALSE
Report Question
Previous
Next
warning
Submit
access_time
Time
Report Question
A bunch of text
Support mcqmojo.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page