

MCQOPTIONS
Saved Bookmarks
This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Digital Communications knowledge and support exam preparation. Choose a topic below to get started.
1. |
The _____ the uncertainty, the ______ is the information content. |
A. | Lesser, greater |
B. | Greater, lesser |
C. | Lesser, lesser |
D. | Greater, greater |
Answer» E. | |
2. |
The conditions for perfect secrecy are |
A. | Only one key transforming message should exist |
B. | All keys should be equally likely |
C. | One key transforming message to each cipher text & all keys should be equally likely |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
3. |
A cipher system is said to have perfect secrecy if |
A. | Posteriori probability is equal to priori probability |
B. | Posteriori probability is greater than priori probability |
C. | Posteriori probability is less than priori probability |
D. | None of the mentioned |
Answer» B. Posteriori probability is greater than priori probability | |
4. |
In Vigenere method ______ is provided. |
A. | Priming key |
B. | Feedback |
C. | Priming key & Feedback |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
5. |
A_CIPHER_SYSTEM_IS_SAID_TO_HAVE_PERFECT_SECRECY_IF?$ |
A. | Posteriori probability is equal to priori probability |
B. | Posteriori probability is greater than priori probability |
C. | Posteriori probability is less than priori probability |
D. | None of the mentioned |
Answer» B. Posteriori probability is greater than priori probability | |
6. |
The _____ the uncertainty, the ______ is the information content.$ |
A. | Lesser, greater |
B. | Greater, lesser |
C. | Lesser, lesser |
D. | Greater, greater |
Answer» E. | |
7. |
The_conditions_for_perfect_secrecy_are$ |
A. | Only one key transforming message should exist |
B. | All keys should be equally likely |
C. | One key transforming message to each cipher text & all keys should be equally likely |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
8. |
When a system is called as unbreakable? |
A. | When unique solution is available |
B. | When unique solution is not available |
C. | All of the mentioned |
D. | None of the mentioned |
Answer» C. All of the mentioned | |
9. |
When the key size is finite, equivocation approaches |
A. | Unity |
B. | Zero |
C. | Infinity |
D. | None of the mentioned |
Answer» C. Infinity | |
10. |
The maximum number of message bits contained in each character is called as |
A. | True rate |
B. | Absolute rate |
C. | Optimum rate |
D. | None of the mentioned |
Answer» C. Optimum rate | |
11. |
In Vigenere method ______ is provided? |
A. | Priming key |
B. | Feedback |
C. | Priming key & Feedback |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
12. |
In auto key method |
A. | Feedback is necessary |
B. | Feedback is not necessary |
C. | Can be either necessary or not |
D. | None of the mentioned |
Answer» B. Feedback is not necessary | |
13. |
The trithemius cipher is a mono alphabetical cipher. |
A. | True |
B. | False |
Answer» C. | |
14. |
In Caesar cipher, each plain text is replaced by |
A. | Alphabet shift |
B. | Numerals |
C. | Symbols |
D. | None of the mentioned |
Answer» B. Numerals | |
15. |
Caesar cipher was a mono alphabetic cipher. |
A. | True |
B. | False |
Answer» B. False | |
16. |
The system which has insufficient information available to crypt-analyst is |
A. | One-time pad |
B. | Unconditionally secure |
C. | One-time pad & Unconditionally secure |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
17. |
The key also contains a |
A. | Plaintext |
B. | Ciphertext |
C. | Plaintext & Ciphertext |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
18. |
Cryptosystems are used for |
A. | Privacy |
B. | Authentication |
C. | Privacy & Authentication |
D. | None of the mentioned |
Answer» D. None of the mentioned | |