Aptitude Reasoning English GK Computer Knowledge Programming Skill Banking Software Testing



Question - 1

In cryptography, what is a cipher?

  • algorithm for performing encryption and decryption
  • encrypted message
  • both algorithm for performing encryption and decryption and encrypted message
  • decrypted message
Solutions
Question - 2

In asymmetric key cryptography, the private key is kept by __________.

  • sender
  • receiver
  • sender and receiver
  • all the connected devices to the network
Solutions
Question - 3

Which one of the following algorithms are not used in asymmetric-key cryptography?

  • rsa algorithm
  • diffie-hellman algorithm
  • electronic code book algorithm
  • dsa algorithm
Solutions
Question - 4

Cryptanalysis is used __________.

  • to find some insecurity in a cryptographic scheme
  • to increase the speed
  • to encrypt the data
  • to make new ciphers
Solutions
Question - 5

Which one of the following is a cryptographic protocol used to secure an HTTP connection?

  • resource reservation protocol
  • explicit congestion notification (ECN)
  • transport layer security (TLS)
  • stream control transmission protocol (SCTP)
Solutions
Question - 6

An asymmetric-key(or public-key) cipher uses:

  • 1 key
  • 2 key
  • 3 key
  • 4 key
Solutions
Question - 7

A straight permutation cipher or a straight P-box has the same number of inputs as:

  • cipher
  • frames
  • outputs
  • bits
Solutions
Question - 8

We use Cryptography term to transform messages to make them-

  • secure and immune to change
  • secure and immune to idle
  • secure and immune to attacks
  • secure and immune to defend
Solutions
Question - 9

The shift cipher is sometimes referred to as the:

  • Caesar cipher
  • shift cipher
  • cipher
  • cipher text
Solutions
Question - 10

The heart of Data Encryption Standard(DES), is the-

  • cipher
  • rounds
  • encryption
  • DES function
Solutions
Question - 11

The International Data Encryption Algorithm(IDEA) was developed by:

  • Xuejia Lai and James Massey
  • Xuejia Lai and Bruce Schneier
  • Xuejia Lai and Carlisle Adams
  • Xuejia Lai and Stafford Tavares
Solutions
Question - 12

ElGamal encryption system is __________.

  • symmetric key encryption algorithm
  • asymmetric key encryption algorithm
  • not an encryption algorithm
  • block cipher method
Solutions
Question - 13

Cryptographic hash function takes an arbitrary block of data and returns _________.

  • fixed size bit string
  • variable size bit string
  • both fixed size bit string and variable size bit string
  • variable sized byte string
Solutions
Question - 14

Voice privacy in GSM cellular telephone protocol is provided by _______.

  • b5/8 cipher
  • b5/6 cipher
  • b5/4 cipher
  • A5/2 cipher
Solutions
Question - 15

In cryptography, the order of the letters in a message is rearranged by __________.

  • transpositional ciphers
  • substitution ciphers
  • both transpositional ciphers and substitution ciphers
  • quadratic ciphers
Solutions
Question - 16

DES works by using-

  • permutation and substitution on 64 bit blocks of plain text
  • only permutations on blocks of 128 bits
  • exclusive ORing key bits with 64 bit blocks
  • 4 rounds of substitution on 64 bit blocks with 56 bit keys
Solutions
Question - 17

The public key system is useful because-

  • it uses two keys
  • there is no key distribution problem as public key can be kept in a commonly accessible database
  • private key can be kept secret
  • it is a symmetric key system
Solutions
Question - 18

ECB stands for:

  • Electronic Control Book
  • Electronic Code Book
  • Electronic Cipher Book
  • Electronic Cryptography Book
Solutions
Question - 19

The cipher which uses the exclusive-or operation as defined in computer science is called:

  • Caesar cipher
  • XOR cipher
  • cipher
  • cipher text
Solutions
Question - 20

RSA stands for-

  • Rivest, Shamir, and Adleman
  • Roger, Shamir, and Adrian
  • Robert, Shamir, and Anthoney
  • Rivest, Shaw, and Adleman
Solutions
Tags:
Cryptography MCQ (Multiple Choice Questions), Advanced Cryptography MCQ, Cryptography MCQ Online test,Cryptography MCQ Questions and answers PDF, Cryptography Interview Questions With Answers, Cryptography Technical Questions with full explanation