Explore topic-wise MCQs in Database.

This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.

1.

WHICH_IS_THE_LARGEST_DISADVANTAGE_OF_SYMMETRIC_ENCRYPTION??$

A. More complex and therefore more time-consuming calculations
B. Problem of the secure transmission of the Secret Key
C. Less secure encryption function
D. Isn’t used any more
Answer» C. Less secure encryption function
2.

Which_is_the_principle_of_the_encryption_using_a_key?$

A. The key indicates which function is used for encryption. Thereby it is more difficult to decrypt an intercepted message as the function is unknown
B. The key contains the secret function for encryption including parameters. Only a password can activate the key
C. All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption
D. The key prevents the user of having to reinstall the software at each change in technology or in the functions for encryption
Answer» C. All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption
3.

Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?#

A. Not true, the message can also be decrypted with the Public Key
B. A so called “one way function with back door” is applied for the encryption
C. The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key
D. The encrypted message contains the function for decryption which identifies the Private Key
Answer» C. The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key
4.

Which of the following requires no password travel across the internet?

A. Readable system
B. Manipulation system
C. Challenge–response system
D. Response system
Answer» D. Response system
5.

Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?

A. Round key algorithm
B. Public key algorithm
C. Advanced Encryption Standard
D. Asymmetric key algorithm
Answer» D. Asymmetric key algorithm
6.

Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________

A. Dictionary attacks
B. Database attacks
C. Minor attacks
D. Random attacks
Answer» B. Database attacks
7.

In which of the following encryption key is used to encrypt and decrypt the data?

A. Public key
B. Private key
C. Symmetric key
D. Asymmetric key
Answer» D. Asymmetric key
8.

Which of the following is not a property of good encryption technique?

A. Relatively simple for authorized users to encrypt and decrypt data
B. Decryption key is extremely difficult for an intruder to determine
C. Encryption depends on a parameter of the algorithm called the encryption key
D. None of the mentioned
Answer» E.
9.

In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

A. Encryption key
B. Decryption key
C. Primary key
D. Authorised key
Answer» C. Primary key
10.

___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.

A. Encryption
B. Data mining
C. Internet Security
D. Architectural security
Answer» B. Data mining