 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
| 1. | WHICH_IS_THE_LARGEST_DISADVANTAGE_OF_SYMMETRIC_ENCRYPTION??$ | 
| A. | More complex and therefore more time-consuming calculations | 
| B. | Problem of the secure transmission of the Secret Key | 
| C. | Less secure encryption function | 
| D. | Isn’t used any more | 
| Answer» C. Less secure encryption function | |
| 2. | Which_is_the_principle_of_the_encryption_using_a_key?$ | 
| A. | The key indicates which function is used for encryption. Thereby it is more difficult to decrypt an intercepted message as the function is unknown | 
| B. | The key contains the secret function for encryption including parameters. Only a password can activate the key | 
| C. | All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption | 
| D. | The key prevents the user of having to reinstall the software at each change in technology or in the functions for encryption | 
| Answer» C. All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption | |
| 3. | Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?# | 
| A. | Not true, the message can also be decrypted with the Public Key | 
| B. | A so called “one way function with back door” is applied for the encryption | 
| C. | The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key | 
| D. | The encrypted message contains the function for decryption which identifies the Private Key | 
| Answer» C. The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key | |
| 4. | Which of the following requires no password travel across the internet? | 
| A. | Readable system | 
| B. | Manipulation system | 
| C. | Challenge–response system | 
| D. | Response system | 
| Answer» D. Response system | |
| 5. | Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it? | 
| A. | Round key algorithm | 
| B. | Public key algorithm | 
| C. | Advanced Encryption Standard | 
| D. | Asymmetric key algorithm | 
| Answer» D. Asymmetric key algorithm | |
| 6. | Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________ | 
| A. | Dictionary attacks | 
| B. | Database attacks | 
| C. | Minor attacks | 
| D. | Random attacks | 
| Answer» B. Database attacks | |
| 7. | In which of the following encryption key is used to encrypt and decrypt the data? | 
| A. | Public key | 
| B. | Private key | 
| C. | Symmetric key | 
| D. | Asymmetric key | 
| Answer» D. Asymmetric key | |
| 8. | Which of the following is not a property of good encryption technique? | 
| A. | Relatively simple for authorized users to encrypt and decrypt data | 
| B. | Decryption key is extremely difficult for an intruder to determine | 
| C. | Encryption depends on a parameter of the algorithm called the encryption key | 
| D. | None of the mentioned | 
| Answer» E. | |
| 9. | In a database where the encryption is applied the data is cannot be handled by the unauthorised user without | 
| A. | Encryption key | 
| B. | Decryption key | 
| C. | Primary key | 
| D. | Authorised key | 
| Answer» C. Primary key | |
| 10. | ___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks. | 
| A. | Encryption | 
| B. | Data mining | 
| C. | Internet Security | 
| D. | Architectural security | 
| Answer» B. Data mining | |