

MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Discrete Mathematics knowledge and support exam preparation. Choose a topic below to get started.
1. |
In which cipher each letter of the plaintext is substituted by any other letter to form the cipher message? |
A. | Shift cipher |
B. | DES encryption |
C. | Block cipher |
D. | AES encryption |
Answer» B. DES encryption | |
2. |
What is the block size of blowfish block cipher? |
A. | 64 bits |
B. | 128 bits |
C. | 1043 bits |
D. | 10 bits |
Answer» B. 128 bits | |
3. |
What type of algorithm does AES encryption use? |
A. | Stream cipher |
B. | Symmetric block cipher |
C. | Asymmetric caesar cipher |
D. | DES encryption |
Answer» C. Asymmetric caesar cipher | |
4. |
What are the steps in the Feistel function? |
A. | expansion, mixing, substitution, permutation |
B. | extract, transform, load |
C. | extract, load, transform |
D. | expansion, divide, mixing, permutation |
Answer» B. extract, transform, load | |
5. |
How many bits are there for random bits and error detection bits in the case of DES block ciphers? |
A. | 72, 1024 |
B. | 56, 8 |
C. | 104, 45 |
D. | 32, 198 |
Answer» C. 104, 45 | |
6. |
______ uses the concept of pseudo-random sequence. |
A. | Stream cipher |
B. | DES encryption |
C. | Caesar cipher |
D. | Block cipher |
Answer» B. DES encryption | |
7. |
Electronic Code Book process is used in ________ |
A. | caesar cipher |
B. | antisymmetric cipher |
C. | block cipher |
D. | stream cipher |
Answer» D. stream cipher | |
8. |
Suppose in order to get a message across enemy lines, we need to choose an initial secret key say, 100110. What will be the decrypted cipher when the original message is 010010011. |
A. | 110100 |
B. | 1001011 |
C. | 0011010 |
D. | 011011 |
Answer» B. 1001011 | |
9. |
There is no secret key in case of ____________ |
A. | Symmetric ciphers |
B. | Asymmetric ciphers |
C. | RSA encryption |
D. | Alpha-numeric cryptography |
Answer» B. Asymmetric ciphers | |
10. |
_______ is an example of asymmetric ciphers. |
A. | Block cipher |
B. | RSA encryption |
C. | AES encryption |
D. | Advanced cryptology |
Answer» C. AES encryption | |