

MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
1. |
WHICH_IS_THE_LARGEST_DISADVANTAGE_OF_SYMMETRIC_ENCRYPTION??$ |
A. | More complex and therefore more time-consuming calculations |
B. | Problem of the secure transmission of the Secret Key |
C. | Less secure encryption function |
D. | Isn’t used any more |
Answer» C. Less secure encryption function | |
2. |
Which_is_the_principle_of_the_encryption_using_a_key?$ |
A. | The key indicates which function is used for encryption. Thereby it is more difficult to decrypt an intercepted message as the function is unknown |
B. | The key contains the secret function for encryption including parameters. Only a password can activate the key |
C. | All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption |
D. | The key prevents the user of having to reinstall the software at each change in technology or in the functions for encryption |
Answer» C. All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption | |
3. |
Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?# |
A. | Not true, the message can also be decrypted with the Public Key |
B. | A so called “one way function with back door” is applied for the encryption |
C. | The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key |
D. | The encrypted message contains the function for decryption which identifies the Private Key |
Answer» C. The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key | |
4. |
Which of the following requires no password travel across the internet? |
A. | Readable system |
B. | Manipulation system |
C. | Challenge–response system |
D. | Response system |
Answer» D. Response system | |
5. |
Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it? |
A. | Round key algorithm |
B. | Public key algorithm |
C. | Advanced Encryption Standard |
D. | Asymmetric key algorithm |
Answer» D. Asymmetric key algorithm | |
6. |
Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________ |
A. | Dictionary attacks |
B. | Database attacks |
C. | Minor attacks |
D. | Random attacks |
Answer» B. Database attacks | |
7. |
In which of the following encryption key is used to encrypt and decrypt the data? |
A. | Public key |
B. | Private key |
C. | Symmetric key |
D. | Asymmetric key |
Answer» D. Asymmetric key | |
8. |
Which of the following is not a property of good encryption technique? |
A. | Relatively simple for authorized users to encrypt and decrypt data |
B. | Decryption key is extremely difficult for an intruder to determine |
C. | Encryption depends on a parameter of the algorithm called the encryption key |
D. | None of the mentioned |
Answer» E. | |
9. |
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without |
A. | Encryption key |
B. | Decryption key |
C. | Primary key |
D. | Authorised key |
Answer» C. Primary key | |
10. |
___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks. |
A. | Encryption |
B. | Data mining |
C. | Internet Security |
D. | Architectural security |
Answer» B. Data mining | |