MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Discrete Mathematics knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
In which cipher each letter of the plaintext is substituted by any other letter to form the cipher message? |
| A. | Shift cipher |
| B. | DES encryption |
| C. | Block cipher |
| D. | AES encryption |
| Answer» B. DES encryption | |
| 2. |
What is the block size of blowfish block cipher? |
| A. | 64 bits |
| B. | 128 bits |
| C. | 1043 bits |
| D. | 10 bits |
| Answer» B. 128 bits | |
| 3. |
What type of algorithm does AES encryption use? |
| A. | Stream cipher |
| B. | Symmetric block cipher |
| C. | Asymmetric caesar cipher |
| D. | DES encryption |
| Answer» C. Asymmetric caesar cipher | |
| 4. |
What are the steps in the Feistel function? |
| A. | expansion, mixing, substitution, permutation |
| B. | extract, transform, load |
| C. | extract, load, transform |
| D. | expansion, divide, mixing, permutation |
| Answer» B. extract, transform, load | |
| 5. |
How many bits are there for random bits and error detection bits in the case of DES block ciphers? |
| A. | 72, 1024 |
| B. | 56, 8 |
| C. | 104, 45 |
| D. | 32, 198 |
| Answer» C. 104, 45 | |
| 6. |
______ uses the concept of pseudo-random sequence. |
| A. | Stream cipher |
| B. | DES encryption |
| C. | Caesar cipher |
| D. | Block cipher |
| Answer» B. DES encryption | |
| 7. |
Electronic Code Book process is used in ________ |
| A. | caesar cipher |
| B. | antisymmetric cipher |
| C. | block cipher |
| D. | stream cipher |
| Answer» D. stream cipher | |
| 8. |
Suppose in order to get a message across enemy lines, we need to choose an initial secret key say, 100110. What will be the decrypted cipher when the original message is 010010011. |
| A. | 110100 |
| B. | 1001011 |
| C. | 0011010 |
| D. | 011011 |
| Answer» B. 1001011 | |
| 9. |
There is no secret key in case of ____________ |
| A. | Symmetric ciphers |
| B. | Asymmetric ciphers |
| C. | RSA encryption |
| D. | Alpha-numeric cryptography |
| Answer» B. Asymmetric ciphers | |
| 10. |
_______ is an example of asymmetric ciphers. |
| A. | Block cipher |
| B. | RSA encryption |
| C. | AES encryption |
| D. | Advanced cryptology |
| Answer» C. AES encryption | |