 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Digital Communications knowledge and support exam preparation. Choose a topic below to get started.
| 1. | Which should be used first to decrypt? | 
| A. | Public key | 
| B. | Private key | 
| C. | Public & Private key | 
| D. | None of the mentioned | 
| Answer» C. Public & Private key | |
| 2. | Which algorithm is used for public key encryption? | 
| A. | RSA | 
| B. | Diffie-Hellman | 
| C. | RSA & Diffie-Hellman | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 3. | WHAT_IS_THE_KEY_SIZE_ALLOWED_IN_PGP??$ | 
| A. | 1024-1056 | 
| B. | 1024-4056 | 
| C. | 1024-4096 | 
| D. | 1024-2048 | 
| Answer» D. 1024-2048 | |
| 4. | Which should be used first to decrypt?$ | 
| A. | Public key | 
| B. | Private key | 
| C. | Public & Private key | 
| D. | None of the mentioned | 
| Answer» C. Public & Private key | |
| 5. | Which algorithm is used for public key encryption?$ | 
| A. | RSA | 
| B. | Diffie-Hellman | 
| C. | RSA & Diffie-Hellman | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 6. | DSA protocol is based on | 
| A. | Discrete logarithm problem | 
| B. | Continuous logarithm problem | 
| C. | Discrete & Continuous logarithm problem | 
| D. | None of the mentioned | 
| Answer» B. Continuous logarithm problem | |
| 7. | The hash function | 
| A. | Is collision free | 
| B. | Has manageable collision | 
| C. | Has high unmanageable level of collision | 
| D. | None of the mentioned | 
| Answer» B. Has manageable collision | |
| 8. | In hash function output length is fixed. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 9. | The digital signature provides authentication to the | 
| A. | Sender | 
| B. | Message | 
| C. | Sender & Message | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 10. | Which operation is used in encryption using IDEA? | 
| A. | Addition modulo 216 | 
| B. | Bit wise XOR | 
| C. | Addition modulo 216 & Bit wise XOR | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 11. | The key size of DES is | 
| A. | 56 bits | 
| B. | 64 bits | 
| C. | 128 bits | 
| D. | 168 bits | 
| Answer» B. 64 bits | |
| 12. | These three ciphers can operate of ______ of plaintext and cipher text. | 
| A. | 128 bit blocks | 
| B. | 64 bit blocks | 
| C. | 256 bit blocks | 
| D. | 156 bit blocks | 
| Answer» C. 256 bit blocks | |
| 13. | Which block cipher has key length of 128 bits? | 
| A. | IDEA | 
| B. | CAST | 
| C. | IDEA & CAST | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 14. | PGP offers _____ block ciphers for message encryption. | 
| A. | Triple-DES | 
| B. | CAST | 
| C. | IDEA | 
| D. | All of the mentioned | 
| Answer» E. | |
| 15. | Data compression includes | 
| A. | Removal of redundant character | 
| B. | Uniform distribution of characters | 
| C. | Removal of redundant character & Uniform distribution of characters | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 16. | For digital signatures private key cryptosystem is used. | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 17. | Public key cryptosystem is used for the encryption of | 
| A. | Messages | 
| B. | Session key | 
| C. | Session key & Messages | 
| D. | None of the mentioned | 
| Answer» C. Session key & Messages | |
| 18. | Pretty good privacy (PGP) security system uses | 
| A. | Public key cryptosystem | 
| B. | Private key cryptosystem | 
| C. | Public & Private key cryptosystem | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |