MCQOPTIONS
Saved Bookmarks
This section includes 11 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
________________ cryptography is based on publicly known mathematically designed algorithms to encrypt the information. |
| A. | Modern |
| B. | Classic |
| C. | Traditional |
| D. | Primitive |
| Answer» B. Classic | |
| 2. |
__________ cryptography has always been focussing on the concept of ‘security through obscurity’. |
| A. | Modern |
| B. | Asymmetric |
| C. | Classic |
| D. | Latest |
| Answer» D. Latest | |
| 3. |
____________ cryptography operates on binary-bit series and strings. |
| A. | Modern |
| B. | Classic |
| C. | Traditional |
| D. | Primitive |
| Answer» B. Classic | |
| 4. |
_______________ cryptography deals with traditional characters, i.e., letters & digits directly. |
| A. | Modern |
| B. | Classic |
| C. | Asymmetric |
| D. | Latest |
| Answer» C. Asymmetric | |
| 5. |
Data Encryption Standard is an example of a _____________ cryptosystem. |
| A. | conventional |
| B. | public key |
| C. | hash key |
| D. | asymmetric-key |
| Answer» B. public key | |
| 6. |
There are ________ types of cryptographic techniques used in general. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» C. 4 | |
| 7. |
Plain text are also called _____________ |
| A. | cipher-text |
| B. | raw text |
| C. | clear-text |
| D. | encrypted text |
| Answer» D. encrypted text | |
| 8. |
Data which is easily readable & understandable without any special algorithm or method is called _________________ |
| A. | cipher-text |
| B. | plain text |
| C. | raw text |
| D. | encrypted text |
| Answer» C. raw text | |
| 9. |
Cryptography can be divided into ______ types. |
| A. | 5 |
| B. | 4 |
| C. | 3 |
| D. | 2 |
| Answer» E. | |
| 10. |
Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data. |
| A. | secret key |
| B. | external programs |
| C. | add-ons |
| D. | secondary key |
| Answer» B. external programs | |
| 11. |
When plain text is converted to unreadable format, it is termed as _____________ |
| A. | rotten text |
| B. | raw text |
| C. | cipher-text |
| D. | ciphen-text |
| Answer» D. ciphen-text | |