 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Digital Communications knowledge and support exam preparation. Choose a topic below to get started.
| 1. | In this Merkle Hellman method same key is used for encryption and decryption. | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 2. | Merkle hellman is a symmetric cryptosystem. | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 3. | Knapsack problem can be solved by | 
| A. | Public key cryptosystem | 
| B. | Private key cryptosystem | 
| C. | Public & Private key cryptosystem | 
| D. | None of the mentioned | 
| Answer» B. Private key cryptosystem | |
| 4. | A set of numbers is called as super increasing if | 
| A. | Each element is greater than previous element | 
| B. | Each element greater than sum of all the previous elements | 
| C. | Each element greater than the average of all elements | 
| D. | Each element lesser than the sum of all the elements | 
| Answer» C. Each element greater than the average of all elements | |
| 5. | A cryptographic hash function has variable output length. | 
| A. | True | 
| B. | False | 
| Answer» C. | |
| 6. | Examples of hash functions are | 
| A. | MD5 | 
| B. | SHA-1 | 
| C. | MD5 & SHA-1 | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 7. | Which algorithm can be used to sign a message? | 
| A. | Public key algorithm | 
| B. | Private key algorithm | 
| C. | Public & Private key algorithm | 
| D. | None of the mentioned | 
| Answer» B. Private key algorithm | |
| 8. | Which has a key length of 128 bits? | 
| A. | IDEA | 
| B. | Triple-DES | 
| C. | IDEA & Triple-DES | 
| D. | None of the mentioned | 
| Answer» B. Triple-DES | |
| 9. | Which are called the block ciphers? | 
| A. | IDEA | 
| B. | CAST | 
| C. | Triple-DES | 
| D. | All of the mentioned | 
| Answer» E. | |
| 10. | Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption. | 
| A. | Messages, session key | 
| B. | Session key, messages | 
| C. | Can be used for both | 
| D. | None of the mentioned | 
| Answer» B. Session key, messages | |
| 11. | PGP system uses | 
| A. | Private key system | 
| B. | Public key system | 
| C. | Private & Public key system | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 12. | Pretty good privacy program is used for | 
| A. | Electronic mails | 
| B. | File encryption | 
| C. | Electronic mails & File encryption | 
| D. | None of the mentioned | 
| Answer» D. None of the mentioned | |
| 13. | In a trapdoor function, the functions are easy to go in | 
| A. | One direction | 
| B. | Two directions | 
| C. | All directions | 
| D. | None of the mentioned | 
| Answer» B. Two directions | |
| 14. | In public key cryptosystem which is kept as public? | 
| A. | Encryption keys | 
| B. | Decryption keys | 
| C. | Encryption & Decryption keys | 
| D. | None of the mentioned | 
| Answer» B. Decryption keys | |
| 15. | In public key cryptosystem _____ keys are used for encryption and decryption. | 
| A. | Same | 
| B. | Different | 
| C. | Encryption Keys | 
| D. | None of the mentioned | 
| Answer» C. Encryption Keys | |