MCQOPTIONS
Saved Bookmarks
This section includes 17 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Reduce the following big-O natations: |
| A. | O[ax7]. |
| B. | O[sin(x)]. |
| C. | O[x7]. |
| D. | O[x7 + x3].View Answer |
| Answer» D. O[x7 + x3].View Answer | |
| 2. |
The estimated computations required to crack a password of 6 characters from the 26 letter alphabet is- |
| A. | 308915776 |
| B. | 11881376 |
| C. | 456976 |
| D. | 8031810176 |
| Answer» B. 11881376 | |
| 3. |
An encryption scheme is unconditionally secure if the ciphertext generated does not contain enough information to determine uniquely the corresponding plaintext, no matter how much cipher text is available. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 4. |
Division of (131B6C3) base 16 by (lA2F) base 16 yeilds – |
| A. | 1AD |
| B. | DAD |
| C. | BAD |
| D. | 9AD |
| Answer» E. | |
| 5. |
In base 26, multiplication of YES by NO gives – |
| A. | THWOE |
| B. | MPAHT |
| C. | MPJNS |
| D. | THWAE |
| Answer» D. THWAE | |
| 6. |
Dividing (11001001) by (100111) gives remainder – |
| A. | 11 |
| B. | 111 |
| C. | 101 |
| D. | 110 |
| Answer» E. | |
| 7. |
Divide (HAPPY)26 by (SAD)26. We get quotient – |
| A. | KD |
| B. | LD |
| C. | JC |
| D. | MC |
| Answer» B. LD | |
| 8. |
AN_ENCRYPTION_SCHEME_IS_UNCONDITIONALLY_SECURE_IF_THE_CIPHERTEXT_GENERATED_DOES_NOT_CONTAIN_ENOUGH_INFORMATION_TO_DETERMINE_UNIQUELY_THE_CORRESPONDING_PLAINTEXT,_NO_MATTER_HOW_MUCH_CIPHER_TEXT_IS_AVAILABLE.?$ |
| A. | True |
| B. | False |
| Answer» B. False | |
| 9. |
The_estimated_computations_required_to_crack_a_password_of_6_characters_from_the_26_letter_alphabet_is-$ |
| A. | 308915776 |
| B. | 11881376 |
| C. | 456976 |
| D. | 8031810176 |
| Answer» B. 11881376 | |
| 10. |
Division of (131B6C3) base 16 by (lA2F) base 16 yeilds ‚Äö√Ñ√∂‚àö√ë‚àö¬?# |
| A. | 1AD |
| B. | DAD |
| C. | BAD |
| D. | 9AD |
| Answer» E. | |
| 11. |
In base 26, multiplication of YES by NO gives –$ |
| A. | THWOE |
| B. | MPAHT |
| C. | MPJNS |
| D. | THWAE |
| Answer» D. THWAE | |
| 12. |
The time required to convert a k-bit integer to its representation in the base 10 in terms of big-O notation is |
| A. | O(log2 n) |
| B. | O(log n) |
| C. | O(log2 2n) |
| D. | O(2log n) |
| Answer» B. O(log n) | |
| 13. |
pi in terms of base 26 is |
| A. | C.DRS |
| B. | D.SQR |
| C. | D.DRS |
| D. | D.DSS |
| Answer» D. D.DSS | |
| 14. |
Dividing (11001001) by (100111) gives remainder –$ |
| A. | 11 |
| B. | 111 |
| C. | 101 |
| D. | 110 |
| Answer» E. | |
| 15. |
Divide (HAPPY)26 by (SAD)26. We get quotient –$ |
| A. | KD |
| B. | LD |
| C. | JC |
| D. | MC |
| Answer» B. LD | |
| 16. |
If the sender and receiver use different keys, the system is referred to as conventional cipher system. |
| A. | True |
| B. | False |
| Answer» C. | |
| 17. |
In brute force attack, on average half of all possible keys must be tried to achieve success. |
| A. | True |
| B. | False |
| Answer» B. False | |