MCQOPTIONS
Saved Bookmarks
This section includes 11 Mcqs, each offering curated multiple-choice questions to sharpen your Columnar Transposition Multiple Choice knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following statement is not true regarding columnar transposition cipher? |
| A. | it is a weak cipher |
| B. | probability of error is high while deciphering |
| C. | it cannot be combined with other ciphers |
| D. | it is a traditional symmetric cipher |
| Answer» D. it is a traditional symmetric cipher | |
| 2. |
What will be the encrypted text corresponding to plain text CLASSIFIED using columnar transposition cipher with a keyword as GAMES ? |
| A. | LFDSIASECI |
| B. | SECIAISDFL |
| C. | CILFAISESD |
| D. | LFSECIAISD |
| Answer» E. | |
| 3. |
Columnar transposition cipher is harder to crack as compared to double transposition cipher? |
| A. | true |
| B. | false |
| Answer» C. | |
| 4. |
In which of the following cipher the plain text and the ciphered text does not have the same set of letters? |
| A. | route cipher |
| B. | columnar transposition cipher |
| C. | myszkowski cipher |
| D. | additive cipher |
| Answer» E. | |
| 5. |
Which of the following cipher is formed by applying columnar transposition cipher twice? |
| A. | Rail Fence cipher |
| B. | Route cipher |
| C. | Double transposition cipher |
| D. | One time pad |
| Answer» D. One time pad | |
| 6. |
Which of the following ciphered text would have NOT used transposition cipher for encryption of the plain text CIPHER ? |
| A. | EPIHRC |
| B. | EHIPCR |
| C. | DTIPRC |
| D. | HRIPEC |
| Answer» D. HRIPEC | |
| 7. |
Columnar cipher falls under the category of? |
| A. | mono-alphabetic cipher |
| B. | poly-alphabetic cipher |
| C. | transposition cipher |
| D. | additive cipher |
| Answer» D. additive cipher | |
| 8. |
Which of the following is an example of asymmetric encryption technique? |
| A. | one-time pad |
| B. | one-time password |
| C. | DSA |
| D. | blowfish |
| Answer» D. blowfish | |
| 9. |
Asymmetric encryption is also known as? |
| A. | Private key cryptography |
| B. | Public key cryptography |
| C. | Public private key cryptography |
| D. | Traditional cryptography |
| Answer» C. Public private key cryptography | |
| 10. |
Which of the following cipher uses two keys to encrypt data? |
| A. | substitution cipher |
| B. | transposition cipher |
| C. | symmetric cipher |
| D. | asymmetric cipher |
| Answer» E. | |
| 11. |
Which of the following is not a type of traditional cipher? |
| A. | Substitution cipher |
| B. | Transposition cipher |
| C. | Mono alphabetic cipher |
| D. | PKCS cipher |
| Answer» E. | |