Cryptography - Computer Networks Questions and Answers

DigitalOcean Referral Badge DigitalOcean Referral Badge

1.

In cryptography, what is cipher?

   A.) algorithm for performing encryption and decryption
   B.) encrypted message
   C.) both (a) and (b)
   D.) none of these

Answer: Option 'A'

algorithm for performing encryption and decryption

DigitalOcean Referral Badge

2.

In asymmetric key cryptography, the private key is kept by

   A.) sender
   B.) receiver
   C.) sender and receiver
   D.) all the connected devices to the network

Answer: Option 'B'

receiver

DigitalOcean Referral Badge

3.

Which one of the following algorithm is not used in asymmetric-key cryptography?

   A.) RSA algorithm
   B.) diffie-hellman algorithm
   C.) electronic code book algorithm
   D.) none of these

Answer: Option 'C'

electronic code book algorithm

DigitalOcean Referral Badge

4.

In cryptography, the order of the letters in a message is rearranged by

   A.) transpositional ciphers
   B.) substitution ciphers
   C.) both (a) and (b)
   D.) none of these

Answer: Option 'A'

transpositional ciphers

DigitalOcean Referral Badge
    DigitalOcean Referral Badge DigitalOcean Referral Badge

5.

What is data encryption standard (DES)?

   A.) block cipher
   B.) stream cipher
   C.) bit cipher
   D.) none of these

Answer: Option 'A'

block cipher

DigitalOcean Referral Badge

6.

Cryptanalysis is used

   A.) to find some insecurity in a cryptographic scheme
   B.) to increase the speed
   C.) to encrypt the data
   D.) none of these

Answer: Option 'A'

to find some insecurity in a cryptographic scheme

DigitalOcean Referral Badge

7.

Which one of the following is a cryptographic protocol used to secure HTTP connection?

   A.) stream control transmission protocol (SCTP)
   B.) transport layer security (TSL)
   C.) explicit congestion notification (ECN)
   D.) resource reservation protocol

Answer: Option 'B'

transport layer security (TSL)

DigitalOcean Referral Badge

8.

Voice privacy in GSM cellular telephone protocol is provided by

   A.) A5/2 cipher
   B.) b5/4 cipher
   C.) b5/6 cipher
   D.) b5/8 cipher

Answer: Option 'A'

A5/2 cipher

DigitalOcean Referral Badge

9.

ElGamal encryption system is

   A.) symmetric key encryption algorithm
   B.) asymmetric key encryption algorithm
   C.) not an encryption algorithm
   D.) none of these

Answer: Option 'B'

asymmetric key encryption algorithm

DigitalOcean Referral Badge
    DigitalOcean Referral Badge DigitalOcean Referral Badge

10.

Cryptographic hash function takes an arbitrary block of data and returns

   A.) fixed-size bit string
   B.) variable size bit string
   C.) both (a) and (b)
   D.) none of these

Answer: Option 'A'

fixed-size bit string

DigitalOcean Referral Badge

Cryptography Download Pdf

Recent Posts