Public Key Cryptography MCQ Questions And Answers

This section focuses on "Public Key Cryptography" in Blockchain. These Multiple Choice Questions (MCQ) should be practiced to improve the Blockchain skills required for various interviews (campus interviews, walk-in interviews, company interviews), placements, entrance exams and other competitive examinations.

1. Public-key cryptography is also known as ?

A. asymmetric cryptography
B. symmetric cryptography
C. Both A and B
D. None of the above

View Answer


2. Which of the following keys are known only to the owner?

A. public key
B. protected key
C. private key
D. unique key

View Answer


3. How many function PKI accomplies?

A. 1
B. 2
C. 3
D. 4

View Answer


4. PKI stands for?

A. public key infrastructure
B. private key infrastructure
C. public key instance
D. private key instance

View Answer


5. A communication is said to be insecure where data is transmitted in a manner that allows for interception also called?

A. attack
B. sniffing
C. ISP
D. citation

View Answer


6. Knapsack problem can be solved by

A. Public key cryptosystem
B. Private key cryptosystem
C. Both A and B
D. Unique key cryptosystem

View Answer


7. Examples of hash functions are

A. MD5
B. SHA-1
C. Both A and B
D. None of the above

View Answer


8. Which has a key length of 128 bits?

A. IDEA
B. Triple-DES
C. Both A and B
D. RSA

View Answer


9. Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption.

A. Messages, session key
B. Session key, messages
C. Can be used for both
D. None of the above

View Answer


10. In public key cryptosystem which is kept as public?

A. Decryption keys
B. Encryption keys
C. Encryption & Decryption keys
D. None of the above

View Answer





Discussion



* You must be logged in to add comment.