MCQ - Cryptography Basics
MCQ - Cryptography Basics
Home Coding problems DS & Algo. ▾ Languages ▾ Web. ▾ Programs ▾ Aptitude ▾ Interview ▾
Home »
Cryptography
Here, we have a set of multiple-choice questions and answers (quiz) on cryptography basics (basic
concepts of cryptography techniques).
Submitted by Monika Sharma, on February 02, 2020
a. Caesar cipher
b. Data Encryption Standard (DES)
c. Diffie Hellman cipher
d. Playfair cipher
Explanation:
https://www.includehelp.com/cryptography/mcq-cryptography-basics.aspx 1/11
7/12/2021 MCQ | Cryptography Basics
The Diffie Hellman uses a pair of asymmetric keys for encryption and decryption processes. All the rest
mentioned cipher techniques use the same key for encryption as well as decryption.
a. Data Confidentiality
b. Data Integrity
c. Authentication
d. None of the above
Explanation:
All the first three options are the principles of data security. None of the mentioned characteristics fall apart form
these principles. Therefore, the correct answer is none of the above.
a. Masquerade
b. Modification of message
c. Denial of service
d. Traffic analysis
Explanation:
In a passive attack, the attacker does not modify any part of the data. His attempt is only to obtain the
information and not to modify it. From the mentioned options, this happens only in Traffic analysis in which the
attacker monitors the pattern of transmission. The rest other options are examples of active attacks.
4) Which of the following options correctly defines the Brute force attack?
a. Brutally forcing the user to share the useful information like pins and passwords.
b. Trying every possible key to decrypt the message.
c. One entity pretends to be some other entity
d. The message or information is modified before sending it to the receiver.
Explanation:
https://www.includehelp.com/cryptography/mcq-cryptography-basics.aspx 2/11
7/12/2021 MCQ | Cryptography Basics
5) "A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext."
Which of the following is capable of becoming a key in a cryptographic algorithm?
a. An integer values
b. A square matrix
c. An array of characters (i.e. a string)
d. All of the above
Explanation:
As the key can be any string of bits, all the mentioned options are capable of becoming a key in a cryptographic
algorithm.
ADVERTISEMENT
a. Cryptography
b. Algorithm
c. Data flow
d. None of these
Answer: a) Cryptography
Explanation:
https://www.includehelp.com/cryptography/mcq-cryptography-basics.aspx 3/11
7/12/2021 MCQ | Cryptography Basics
d. All of these
Explanation:
a. True
b. False
Answer: a) True
Explanation:
The plaintext is used to encrypt to different cipher text with different keys.
a. asymmetric-key
b. logical-key
c. symmetric-key
d. None of these
Answer: c) symmetric-key
Explanation:
a. Conventional cryptosystem
b. Asymmetric cryptosystem
c. Caesar's cryptosystem
d. All of these
ADVERTISEMENT
https://www.includehelp.com/cryptography/mcq-cryptography-basics.aspx 4/11
7/12/2021 MCQ | Cryptography Basics
a. Symmetric
b. Asymmetric
c. Symmetric & Asymmetric both
d. None of these
Explanation:
a. Confidentiality
b. Authenticityn
c. Data integrityn
d. Non-repudiation
e. All of these
Explanation:
Confidentiality, authenticity, data integrity and non-repudiation security are the key goals of cryptography.
a. True
b. False
https://www.includehelp.com/cryptography/mcq-cryptography-basics.aspx 5/11
7/12/2021 MCQ | Cryptography Basics
Answer: a) True
Explanation:
a. Encrypted message
b. Algorithm for performing encryption and decryption
c. Both algorithm for performing encryption and decryption and encrypted message
d. Decrypted message
Explanation:
a. Sender
b. Receiver
c. Sender and receiver
d. All the connected devices to the network
ADVERTISEMENT
Answer: b) Receiver
Explanation:
16) Which one of the following algorithms is not used in asymmetric-key cryptography?
https://www.includehelp.com/cryptography/mcq-cryptography-basics.aspx 6/11
7/12/2021 MCQ | Cryptography Basics
a. DSA algorithm
b. Electronic code book algorithm
c. Diffie-Hellman algorithm
d. RSA algorithm
Explanation:
The electronic code book algorithm is a block cypher method in which a block of data corresponds to each block
of text in the encrypted message.
17) Which is the cryptographic protocol that is used to protect an HTTP connection?
Explanation:
In order to prevent eavesdropping, tampering and message forgery, TLS has strong message authentication and
key-material generation.
18) A key is a value that works with a cryptographic algorithm to produce a specific cipher text.
a. True
b. False
Answer: a) True
Explanation:
A key is a value that works with a cryptographic algorithm to produce a specific cipher text.
19) A Public key size and conventional cryptography’s secret key size are closely related with one another.
a. True
b. False
Answer: b) False
Explanation:
A Public key size and conventional cryptography’s secret key size are unrelated with one another.
https://www.includehelp.com/cryptography/mcq-cryptography-basics.aspx 7/11
7/12/2021 MCQ | Cryptography Basics
a. Public-key cryptography
b. Private-key cryptography
c. Both
d. None of these
Explanation:
The ElGamal encryption scheme in cryptography is an asymmetrical key encryption algorithm based on the
Diffie-Hellman key exchange for public-key cryptography.
More...
ADVERTISEMENT