Computer Networks Questions & Answers –
Cryptography
1. In cryptography, what is cipher?
a) algorithm for performing encryption and decryption
b) encrypted message
c) both algorithm for performing encryption and decryption and encrypted message
d) none of the mentioned
a) algorithm for performing encryption and decryption
b) encrypted message
c) both algorithm for performing encryption and decryption and encrypted message
d) none of the mentioned
Answer: a
Explanation: None.
Explanation: None.
2. In asymmetric key cryptography,
the private key is kept by
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
Answer: b
Explanation: None.
Explanation: None.
3. Which one of the following
algorithm is not used in asymmetric-key cryptography?
a) rsa algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned
a) rsa algorithm
b) diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned
Answer: c
Explanation: None.
Explanation: None.
4. In cryptography, the order of the
letters in a message is rearranged by
a) transpositional ciphers
b) substitution ciphers
c) both transpositional ciphers and substitution ciphers
d) none of the mentioned
a) transpositional ciphers
b) substitution ciphers
c) both transpositional ciphers and substitution ciphers
d) none of the mentioned
Answer: a
Explanation: None.
Explanation: None.
5. What is data encryption standard
(DES)?
a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned
a) block cipher
b) stream cipher
c) bit cipher
d) none of the mentioned
Answer: a
Explanation: None.
Explanation: None.
6. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned
Answer: a
Explanation: None.
Explanation: None.
7. Which one of the following is a
cryptographic protocol used to secure HTTP connection?
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol
a) stream control transmission protocol (SCTP)
b) transport layer security (TSL)
c) explicit congestion notification (ECN)
d) resource reservation protocol
Answer: b
Explanation: None.
Explanation: None.
8. Voice privacy in GSM cellular
telephone protocol is provided by
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
a) A5/2 cipher
b) b5/4 cipher
c) b5/6 cipher
d) b5/8 cipher
Answer: a
Explanation: None
Explanation: None
9. ElGamal encryption system is
a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) none of the mentioned
a) symmetric key encryption algorithm
b) asymmetric key encryption algorithm
c) not an encryption algorithm
d) none of the mentioned
Answer: b
Explanation: None.
Explanation: None.
10. Cryptographic hash function
takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both fixed size bit string and variable size bit string
d) none of the mentioned
a) fixed size bit string
b) variable size bit string
c) both fixed size bit string and variable size bit string
d) none of the mentioned
Answer: a
Explanation: None.
Explanation: None.
ليست هناك تعليقات:
إرسال تعليق