Explore topic-wise MCQs in Cryptography and Network Security.

This section includes 17 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Reduce the following big-O natations:

A. O[ax7].
B. O[sin(x)].
C. O[x7].
D. O[x7 + x3].View Answer
Answer» D. O[x7 + x3].View Answer
2.

The estimated computations required to crack a password of 6 characters from the 26 letter alphabet is-

A. 308915776
B. 11881376
C. 456976
D. 8031810176
Answer» B. 11881376
3.

An encryption scheme is unconditionally secure if the ciphertext generated does not contain enough information to determine uniquely the corresponding plaintext, no matter how much cipher text is available.

A. True
B. False
Answer» B. False
4.

Division of (131B6C3) base 16 by (lA2F) base 16 yeilds –

A. 1AD
B. DAD
C. BAD
D. 9AD
Answer» E.
5.

In base 26, multiplication of YES by NO gives –

A. THWOE
B. MPAHT
C. MPJNS
D. THWAE
Answer» D. THWAE
6.

Dividing (11001001) by (100111) gives remainder –

A. 11
B. 111
C. 101
D. 110
Answer» E.
7.

Divide (HAPPY)26 by (SAD)26. We get quotient –

A. KD
B. LD
C. JC
D. MC
Answer» B. LD
8.

AN_ENCRYPTION_SCHEME_IS_UNCONDITIONALLY_SECURE_IF_THE_CIPHERTEXT_GENERATED_DOES_NOT_CONTAIN_ENOUGH_INFORMATION_TO_DETERMINE_UNIQUELY_THE_CORRESPONDING_PLAINTEXT,_NO_MATTER_HOW_MUCH_CIPHER_TEXT_IS_AVAILABLE.?$

A. True
B. False
Answer» B. False
9.

The_estimated_computations_required_to_crack_a_password_of_6_characters_from_the_26_letter_alphabet_is-$

A. 308915776
B. 11881376
C. 456976
D. 8031810176
Answer» B. 11881376
10.

Division of (131B6C3) base 16 by (lA2F) base 16 yeilds ‚Äö√Ñ√∂‚àö√ë‚àö¬?#

A. 1AD
B. DAD
C. BAD
D. 9AD
Answer» E.
11.

In base 26, multiplication of YES by NO gives –$

A. THWOE
B. MPAHT
C. MPJNS
D. THWAE
Answer» D. THWAE
12.

The time required to convert a k-bit integer to its representation in the base 10 in terms of big-O notation is

A. O(log2 n)
B. O(log n)
C. O(log2 2n)
D. O(2log n)
Answer» B. O(log n)
13.

pi in terms of base 26 is

A. C.DRS
B. D.SQR
C. D.DRS
D. D.DSS
Answer» D. D.DSS
14.

Dividing (11001001) by (100111) gives remainder –$

A. 11
B. 111
C. 101
D. 110
Answer» E.
15.

Divide (HAPPY)26 by (SAD)26. We get quotient –$

A. KD
B. LD
C. JC
D. MC
Answer» B. LD
16.

If the sender and receiver use different keys, the system is referred to as conventional cipher system.

A. True
B. False
Answer» C.
17.

In brute force attack, on average half of all possible keys must be tried to achieve success.

A. True
B. False
Answer» B. False