Encryption and Its Applications - DBMS

1.

Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?

   A.) Not true, the message can also be decrypted with the Public Key
   B.) A so called “one way function with back door” is applyed for the encryption
   C.) The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key
   D.) The encrypted message contains the function for decryption which identifies the Private Key

Answer: Option 'B'

A so called “one way function with back door” is applyed for the encryption

2.

Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it ?

   A.) Round key algorithm
   B.) Advanced Encryption Standard
   C.) Public key algorithm
   D.) Asymmetric key algorithm

Answer: Option 'B'

Advanced Encryption Standard

3.

Which of the following requires no password travel across the internet ?

   A.) Readable system
   B.) Manipulation system
   C.) Challenge–response system
   D.) Responce system

Answer: Option 'C'

Challenge–response system

4.

In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

   A.) Encryption key
   B.) Decryption key
   C.) Primary key
   D.) Authorised key

Answer: Option 'B'

Decryption key

5.

Which of the following is not a property of good encryption technique ?

   A.) Relatively simple for authorized users to encrypt and decrypt data
   B.) Decryption key is extremely difficult for an intruder to determine
   C.) Encryption depends on a parameter of the algorithm called the encryption key
   D.) None of the mentioned

Answer: Option 'D'

None of the mentioned

Encryption and Its Applications Download Pdf