 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Discrete Mathematics knowledge and support exam preparation. Choose a topic below to get started.
| 1. | In which cipher each letter of the plaintext is substituted by any other letter to form the cipher message? | 
| A. | Shift cipher | 
| B. | DES encryption | 
| C. | Block cipher | 
| D. | AES encryption | 
| Answer» B. DES encryption | |
| 2. | What is the block size of blowfish block cipher? | 
| A. | 64 bits | 
| B. | 128 bits | 
| C. | 1043 bits | 
| D. | 10 bits | 
| Answer» B. 128 bits | |
| 3. | What type of algorithm does AES encryption use? | 
| A. | Stream cipher | 
| B. | Symmetric block cipher | 
| C. | Asymmetric caesar cipher | 
| D. | DES encryption | 
| Answer» C. Asymmetric caesar cipher | |
| 4. | What are the steps in the Feistel function? | 
| A. | expansion, mixing, substitution, permutation | 
| B. | extract, transform, load | 
| C. | extract, load, transform | 
| D. | expansion, divide, mixing, permutation | 
| Answer» B. extract, transform, load | |
| 5. | How many bits are there for random bits and error detection bits in the case of DES block ciphers? | 
| A. | 72, 1024 | 
| B. | 56, 8 | 
| C. | 104, 45 | 
| D. | 32, 198 | 
| Answer» C. 104, 45 | |
| 6. | ______ uses the concept of pseudo-random sequence. | 
| A. | Stream cipher | 
| B. | DES encryption | 
| C. | Caesar cipher | 
| D. | Block cipher | 
| Answer» B. DES encryption | |
| 7. | Electronic Code Book process is used in ________ | 
| A. | caesar cipher | 
| B. | antisymmetric cipher | 
| C. | block cipher | 
| D. | stream cipher | 
| Answer» D. stream cipher | |
| 8. | Suppose in order to get a message across enemy lines, we need to choose an initial secret key say, 100110. What will be the decrypted cipher when the original message is 010010011. | 
| A. | 110100 | 
| B. | 1001011 | 
| C. | 0011010 | 
| D. | 011011 | 
| Answer» B. 1001011 | |
| 9. | There is no secret key in case of ____________ | 
| A. | Symmetric ciphers | 
| B. | Asymmetric ciphers | 
| C. | RSA encryption | 
| D. | Alpha-numeric cryptography | 
| Answer» B. Asymmetric ciphers | |
| 10. | _______ is an example of asymmetric ciphers. | 
| A. | Block cipher | 
| B. | RSA encryption | 
| C. | AES encryption | 
| D. | Advanced cryptology | 
| Answer» C. AES encryption | |