

MCQOPTIONS
Saved Bookmarks
This section includes 20 Mcqs, each offering curated multiple-choice questions to sharpen your Digital Communications knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which algorithm can be used to sign a message? |
A. | Public key algorithm |
B. | Private key algorithm |
C. | Public & Private key algorithm |
D. | None of the mentioned |
Answer» B. Private key algorithm | |
2. |
Cipher system can be solved effectively by statistically using |
A. | Time of occurrence |
B. | Frequency of occurrence |
C. | Length of the message |
D. | None of the mentioned |
Answer» C. Length of the message | |
3. |
A set of numbers is called as super increasing if |
A. | Each element is greater than previous element |
B. | Each element greater than sum of all the previous elements |
C. | Each element greater than the average of all elements |
D. | Each element lesser than the sum of all the elements |
Answer» C. Each element greater than the average of all elements | |
4. |
In stream encryption, the key sequence repeats itself. |
A. | True |
B. | False |
Answer» C. | |
5. |
Which should be used first to decrypt? |
A. | Public key |
B. | Private key |
C. | Public & Private key |
D. | None of the mentioned |
Answer» C. Public & Private key | |
6. |
For n input bits the number of substitution patterns are |
A. | 2n |
B. | (2n)! |
C. | 1/2n! |
D. | 2n! |
Answer» C. 1/2n! | |
7. |
The substitution of the letters are done |
A. | Serially |
B. | Parallel way |
C. | Serially & Parallel way |
D. | None of the mentioned |
Answer» C. Serially & Parallel way | |
8. |
In transposition, the plaintext letters are |
A. | Substituted |
B. | Rearranged |
C. | Removed |
D. | None of the mentioned |
Answer» C. Removed | |
9. |
A cryptographic hash function has variable output length. |
A. | True |
B. | False |
Answer» C. | |
10. |
In cipher feedback method, encryption is done on |
A. | Single individual bits |
B. | Characters |
C. | Single individual bits & Characters |
D. | None of the mentioned |
Answer» B. Characters | |
11. |
Encryption transformations are known as |
A. | Diffusion |
B. | Confusion |
C. | Diffusion & Confusion |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
12. |
Synchronous ciphers uses |
A. | Confusion |
B. | Diffusion |
C. | Confusion & Diffusion |
D. | None of the mentioned |
Answer» B. Diffusion | |
13. |
Which should be kept as a secret in public key cryptosystem? |
A. | Encryption key |
B. | Decryption key |
C. | Encryption & Decryption key |
D. | None of the mentioned |
Answer» C. Encryption & Decryption key | |
14. |
Euler's totient function is determined by |
A. | pq |
B. | (p-1)(q-1) |
C. | (p+1)(q+1) |
D. | p/q |
Answer» C. (p+1)(q+1) | |
15. |
Examples of hash functions are |
A. | MD5 |
B. | SHA-1 |
C. | MD5 & SHA-1 |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
16. |
Public key cryptosystem uses same key for both encryption and decryption. |
A. | True |
B. | False |
Answer» C. | |
17. |
In which method, key-stream is generated independently? |
A. | Synchronous |
B. | Self synchronous |
C. | Synchronous & Self synchronous |
D. | None of the mentioned |
Answer» B. Self synchronous | |
18. |
What is the key size allowed in PGP? |
A. | 1024-1056 |
B. | 1024-4056 |
C. | 1024-4096 |
D. | 1024-2048 |
Answer» D. 1024-2048 | |
19. |
Public key cryptosystem is also known as |
A. | One way function |
B. | Two way function |
C. | Feedback function |
D. | None of the mentioned |
Answer» B. Two way function | |
20. |
Which algorithm is used for public key encryption? |
A. | RSA |
B. | Diffie-Hellman |
C. | RSA & Diffie-Hellman |
D. | None of the mentioned |
Answer» D. None of the mentioned | |