Basic Cryptography MCQ with answers-01

Posted by

Cryptography SECURITY MCQ with all answers (100% free pdf download)

Basic cryptography: Public key cryptography ,RSA public key crypto ,Digital signature Hash
functions ,Public key distribution ,Real world protocols ,Basic terminologies ,Email security
certificates ,Transport Layer security TLS ,IP security , DNS security.

1. Which of the following is false for RSA algorithm :-
a. Security of RSA depends on problem of factoring large number
b. In software, RSA is 100 times slower than DES
c. In hardware, RSA is 10 times slower than DES
d. RSA can be faster than the symmetric algorithm

2. Which of the follwoing is true :-
a. The receiver can verify signature using public key
b. Public key is used to encrypt the message
c. Message is send without any key
d. public key cryptography is symmetric cryptography

3. A cryptographic hash functions are :
a. Easy to compute
b. Used in creating digital fingerprint
c. Both 1 and 2
d. None of the above
Answer:- c

4. In public key distribution :-
a. Public keys are published in a database
b. Receiver decrypts the message using their private key
c. Sender gets receiver’s public key from databse
d. All of the above
Answer:- d

5. Some of cryptography protocols are :-
a. SSL
b. SET
c. IPSec
d. All of the above
Answer:- d

6. Which of the following is true of SSL(Secured Socket Layer) :-
a. Client authentication is compulsary
b. It is developed by Netscape
c. Connection is need not be encrypted
d. All of the above
Answer:- b

7. The OSI model has :-
a. 8 Layers
b. IP Sec protocol in network layer
c. SSL protocol in application layer
d. All of the above
Answer:- b

8. In OSI Model :-
a. routing takes place in network layer
b. Physical layer transmits and receives unstructured raw data
c. HTTP is application level protocol
d. All of the above
Answer:- d

9. A public key certificate contains :-
a. Private and public key of the entity being certified
b. Digital signature algorithm id
c. Identity of the receiver
d. Both 1 and 2 COMPUTER SYSTEM SECURITY 2020-21
43 University Academy
Answer:- d

10.In HTTP model, content being sent might be changed by a third person
a. True
b. False
Answer:- a

11.The TLS is developed by Microsoft
a. True
b. False
Answer:- b

12.Which of the following is false :-
a. There are 13 root servers in the world
b. DoS attack was performed on them in 2007
c. Both 1 and 2
d. None of the above
Answer:- c

13.DNS cache poisoning is
a. Entering false information into DNS cache
b. Also known as DNS spoofing
c. where raffic goes to wrong website
d. All of the above
Answer:- d

14.DNS servers generally use UDP protocol
a. True
b. False
Answer:- a

15. Which of the following is wrong :-
a. DNSSEC provides mechanism to authenticate servers and requests
b. DNSSEC protects from data spoofing
c. Public key is needed for DNSSEC
d. None of the above
Answer:- c

16. Which one is DES?
a. Block cipher
b. Bit cipher
c. Stream clipher
d. None of the above
Answer a

17. Encryption system is?
a. Symmetric key encryption algorithm
b. not an encryption algorithm
c. Asymmetric key encryption algorithm
d. None of the above
Answer a

18. Which one is not a RC5 operation?
a. RC5-CipherText Stealing
b. RC5-Cipher Block Chaining
c. RC5-Cipher Padding
d. RC5 block cipher
Answer : c

19. An asymmetric-key cipher uses
a. 1 Key
b. 2 Key
c. 3 Key
d. 4 Key
Answer – b

20. Which one of the following protocol is used to secure HTTP connection?
a. Resource reservation protocol
b. Transport layer security (TSL)
c. Xplicit congestion notification (ECN)
d. Stream control transmission protocol (SCTP)
Answer – b

21. Cryptography term is used to transforming messages to make them secure and to prevent from
a. Change
b. Defend
c. Idle
d. Attacks
Answer : d

22. Shift cipher is also referred to as the
a. Caesar cipher
b. cipher text
c. Shift cipher
d. None of the above
Answer: a

23. Which one is the Heart of Data Encryption Standard (DES)?
a. DES function
b. Encryption
c. Rounds
d. Cipher
Answer – a

24. DES stands for…………………
a. Data Encryption Slots
b. Data Encryption Subscription
c. Data Encryption Standard
d. Data Encryption Solutions
Answer – c

25. Encryption algorithm is used to transforms plaintext into……………………….
a. Simple Text
b. Cipher Text
c. Empty Text
d. None of the above
Answer : d