Home » Cryptography

MCQ | Cryptography Basics

Here, we have a set of multiple-choice questions and answers (quiz) on cryptography basics (basic concepts of cryptography techniques).
Submitted by Monika Sharma, on February 02, 2020

1) Which of the following is not a type of symmetric-key cryptography technique?

  1. Caesar cipher
  2. Data Encryption Standard (DES)
  3. Diffie Hellman cipher
  4. Playfair cipher

Answer: c) Diffie Hellman cipher

Explanation:

The Diffie Hellman uses a pair of asymmetric keys for encryption and decryption processes. All the rest mentioned cipher techniques use the same key for encryption as well as decryption.


2) Which of the following is not a principle of data security?

  1. Data Confidentiality
  2. Data Integrity
  3. Authentication
  4. None of the above

Answer: d) None of the above

Explanation:

All the first three options are the principles of data security. None of the mentioned characteristics fall apart form these principles. Therefore, the correct answer is none of the above.


3) Which of the following security attacks is not an active attack?
OR
Which of the following attacks is a passive attack?

  1. Masquerade
  2. Modification of message
  3. Denial of service
  4. Traffic analysis

Answer: d) Traffic analysis

Explanation:

In a passive attack, the attacker does not modify any part of the data. His attempt is only to obtain the information and not to modify it. From the mentioned options, this happens only in Traffic analysis in which the attacker monitors the pattern of transmission. The rest other options are examples of active attacks.


4) Which of the following options correctly defines the Brute force attack?

  1. Brutally forcing the user to share the useful information like pins and passwords.
  2. Trying every possible key to decrypt the message.
  3. One entity pretends to be some other entity
  4. The message or information is modified before sending it to the receiver.

Answer: b) Trying every possible key to decrypt the message.

Explanation:

Only option b) is the correct definition for brute force attack.


5) "A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?

  1. An integer values
  2. A square matrix
  3. An array of characters (i.e. a string)
  4. All of the above

Answer: d) All of the above

Explanation:

As the key can be any string of bits, all the mentioned options are capable of becoming a key in a cryptographic algorithm.







Comments and Discussions

Ad: Are you a blogger? Join our Blogging forum.





Languages: » C » C++ » C++ STL » Java » Data Structure » C#.Net » Android » Kotlin » SQL
Web Technologies: » PHP » Python » JavaScript » CSS » Ajax » Node.js » Web programming/HTML
Solved programs: » C » C++ » DS » Java » C#
Aptitude que. & ans.: » C » C++ » Java » DBMS
Interview que. & ans.: » C » Embedded C » Java » SEO » HR
CS Subjects: » CS Basics » O.S. » Networks » DBMS » Embedded Systems » Cloud Computing
» Machine learning » CS Organizations » Linux » DOS
More: » Articles » Puzzles » News/Updates


© https://www.includehelp.com some rights reserved.