

MCQOPTIONS
Saved Bookmarks
This section includes 17 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Reduce the following big-O natations: |
A. | O[ax7]. |
B. | O[sin(x)]. |
C. | O[x7]. |
D. | O[x7 + x3].View Answer |
Answer» D. O[x7 + x3].View Answer | |
2. |
The estimated computations required to crack a password of 6 characters from the 26 letter alphabet is- |
A. | 308915776 |
B. | 11881376 |
C. | 456976 |
D. | 8031810176 |
Answer» B. 11881376 | |
3. |
An encryption scheme is unconditionally secure if the ciphertext generated does not contain enough information to determine uniquely the corresponding plaintext, no matter how much cipher text is available. |
A. | True |
B. | False |
Answer» B. False | |
4. |
Division of (131B6C3) base 16 by (lA2F) base 16 yeilds – |
A. | 1AD |
B. | DAD |
C. | BAD |
D. | 9AD |
Answer» E. | |
5. |
In base 26, multiplication of YES by NO gives – |
A. | THWOE |
B. | MPAHT |
C. | MPJNS |
D. | THWAE |
Answer» D. THWAE | |
6. |
Dividing (11001001) by (100111) gives remainder – |
A. | 11 |
B. | 111 |
C. | 101 |
D. | 110 |
Answer» E. | |
7. |
Divide (HAPPY)26 by (SAD)26. We get quotient – |
A. | KD |
B. | LD |
C. | JC |
D. | MC |
Answer» B. LD | |
8. |
AN_ENCRYPTION_SCHEME_IS_UNCONDITIONALLY_SECURE_IF_THE_CIPHERTEXT_GENERATED_DOES_NOT_CONTAIN_ENOUGH_INFORMATION_TO_DETERMINE_UNIQUELY_THE_CORRESPONDING_PLAINTEXT,_NO_MATTER_HOW_MUCH_CIPHER_TEXT_IS_AVAILABLE.?$ |
A. | True |
B. | False |
Answer» B. False | |
9. |
The_estimated_computations_required_to_crack_a_password_of_6_characters_from_the_26_letter_alphabet_is-$ |
A. | 308915776 |
B. | 11881376 |
C. | 456976 |
D. | 8031810176 |
Answer» B. 11881376 | |
10. |
Division of (131B6C3) base 16 by (lA2F) base 16 yeilds ‚Äö√Ñ√∂‚àö√ë‚àö¬?# |
A. | 1AD |
B. | DAD |
C. | BAD |
D. | 9AD |
Answer» E. | |
11. |
In base 26, multiplication of YES by NO gives –$ |
A. | THWOE |
B. | MPAHT |
C. | MPJNS |
D. | THWAE |
Answer» D. THWAE | |
12. |
The time required to convert a k-bit integer to its representation in the base 10 in terms of big-O notation is |
A. | O(log2 n) |
B. | O(log n) |
C. | O(log2 2n) |
D. | O(2log n) |
Answer» B. O(log n) | |
13. |
pi in terms of base 26 is |
A. | C.DRS |
B. | D.SQR |
C. | D.DRS |
D. | D.DSS |
Answer» D. D.DSS | |
14. |
Dividing (11001001) by (100111) gives remainder –$ |
A. | 11 |
B. | 111 |
C. | 101 |
D. | 110 |
Answer» E. | |
15. |
Divide (HAPPY)26 by (SAD)26. We get quotient –$ |
A. | KD |
B. | LD |
C. | JC |
D. | MC |
Answer» B. LD | |
16. |
If the sender and receiver use different keys, the system is referred to as conventional cipher system. |
A. | True |
B. | False |
Answer» C. | |
17. |
In brute force attack, on average half of all possible keys must be tried to achieve success. |
A. | True |
B. | False |
Answer» B. False | |