Cryptography MCQ Questions & Answers
Cryptography MCQs : This section focuses on "Basics" of Cryptography. These Multiple Choice Questions (MCQ) should be practiced to improve the Cryptography skills required for various interviews (campus interview, walk-in interview, company interview), placements, entrance exams and other competitive examinations.
1. Cryptology, the study of cryptosystems.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : A
Explanation: True, Cryptology, the study of cryptosystems.
2. Cryptology can be subdivided into ______ branches.
A. 1
B. 2
C. 3
D. 4
View Answer
Ans : B
Explanation: Cryptology can be subdivided into two branches : Cryptography and Cryptanalysis
3. The art and science of breaking the cipher text is known as?
A. Cryptography
B. Crypgenalysis
C. Cryptanalysis
D. Both A and B
View Answer
Ans : C
Explanation: The art and science of breaking the cipher text is known as cryptanalysis
4. Authentication service has ______ variants.
A. 1
B. 2
C. 3
D. 4
View Answer
Ans : B
Explanation: Authentication service has two variants : Message authentication and Entity authentication.
5. Which of the following is the scrambled version of the plaintext produced by the encryption algorithm using a specific the encryption key?
A. Plaintext
B. Encryption
C. Decryption
D. Ciphertext
View Answer
Ans : D
Explanation: Ciphertext. It is the scrambled version of the plaintext produced by the encryption algorithm using a specific the encryption key. The ciphertext is not guarded. It flows on public channel.
6. For a given cryptosystem, a collection of all possible decryption keys is called a?
A. Encryption Key
B. Decryption Key
C. key space
D. key system
View Answer
Ans : C
Explanation: For a given cryptosystem, a collection of all possible decryption keys is called a key space.
7. How many Types of Cryptosystems there?
A. 1
B. 2
C. 3
D. 4
View Answer
Ans : B
Explanation: There are two types of cryptosystems based on the manner in which encryption-decryption is carried out in the system : Symmetric Key Encryption AND Asymmetric Key Encryption.
8. The encryption process where same keys are used for encrypting and decrypting the information is known as ?
A. Symmetric Key Encryption
B. Asymmetric Key Encryption
C. Both A and B
D. None of the above
View Answer
Ans : A
Explanation: The encryption process where same keys are used for encrypting and decrypting the information is known as Symmetric Key Encryption.
9. The main goal of a _________ is to obtain unauthorized access to the information.
A. Simple Attack
B. Active Attacks
C. Internet Attack
D. Passive Attack
View Answer
Ans : D
Explanation: The main goal of a passive attack is to obtain unauthorized access to the information. For example, actions such as intercepting and eavesdropping on the communication channel can be regarded as passive attack.
10. A cryptosystem is also referred to as a cipher system.
A. TRUE
B. FALSE
C. Can be true or false
D. Can not say
View Answer
Ans : A
Explanation: True, A cryptosystem is also referred to as a cipher system.
Discussion