

MCQOPTIONS
Saved Bookmarks
This section includes 16 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Networks knowledge and support exam preparation. Choose a topic below to get started.
1. |
An electronic document that establishes your credentials when you are performing transactions. |
A. | Digital code |
B. | OTP |
C. | |
D. | Digital certificate |
Answer» E. | |
2. |
Encryption standard that is selected by the US government to replace DES. |
A. | AES |
B. | BES |
C. | CES |
D. | DES |
Answer» B. BES | |
3. |
Triple-DES has ______ keys. |
A. | 1 |
B. | 2 |
C. | 5 |
D. | 4 |
Answer» C. 5 | |
4. |
These ciphers replace a character or characters with a different character or characters, based on some key. |
A. | Polyalphabetic substitution based |
B. | Transposition-based |
C. | Substitution based |
D. | Mono alphabetic substitution based |
Answer» E. | |
5. |
ENCRYPTION_STANDARD_THAT_IS_SELECTED_BY_THE_US_GOVERNMENT_TO_REPLACE_DES.?$ |
A. | AES |
B. | BES |
C. | CES |
D. | DES |
Answer» B. BES | |
6. |
ELGAMAL_ENCRYPTION_SYSTEM_IS?$ |
A. | symmetric key encryption algorithm |
B. | asymmetric key encryption algorithm |
C. | not an encryption algorithm |
D. | none of the mentioned |
Answer» C. not an encryption algorithm | |
7. |
An electronic document that establishes your credentials when you are performing transactions.$ |
A. | Digital code |
B. | OTP |
C. | |
D. | Digital certificate |
Answer» E. | |
8. |
Cryptographic_hash_function_takes_an_arbitrary_block_of_data_and_returns$ |
A. | fixed size bit string |
B. | variable size bit string |
C. | both fixed size bit string and variable size bit string |
D. | none of the mentioned |
Answer» B. variable size bit string | |
9. |
Triple-DES has ______ keys? |
A. | 1 |
B. | 2 |
C. | 5 |
D. | 4 |
Answer» C. 5 | |
10. |
Voice privacy in GSM cellular telephone protocol is provided b? |
A. | A5/2 cipher |
B. | b5/4 cipher |
C. | b5/6 cipher |
D. | b5/8 cipher |
Answer» B. b5/4 cipher | |
11. |
Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption. |
A. | 64 |
B. | 8 |
C. | 16 |
D. | 4 |
Answer» D. 4 | |
12. |
DES stands for? |
A. | Data Encryption Standard |
B. | Data Encryption Statistics |
C. | Data Encryption System |
D. | Data Encryption Sequence |
Answer» B. Data Encryption Statistics | |
13. |
In public key cryptography, a key that decrypts the message. |
A. | public key |
B. | unique key |
C. | private key |
D. | security key |
Answer» D. security key | |
14. |
An encryption technique with 2 keys is ______________ |
A. | Monoalphabetic Cipher |
B. | Cryptography |
C. | Private key cryptography |
D. | Public key cryptography |
Answer» E. | |
15. |
A type of cipher that uses multiple alphabetic strings. |
A. | Substitution based |
B. | Transposition-based |
C. | Polyalphabetic substitution based |
D. | Mono alphabetic substitution based |
Answer» D. Mono alphabetic substitution based | |
16. |
Encryption is the study of creating and using decryption techniques. |
A. | True |
B. | False |
Answer» C. | |