The Art of Cryptography Interview Question-Answer

Q.1 Which of the following poses challenges in the breaking of the Vigenère Cipher?

       A. Length of the Key

       B. Frequency Analysis

       C. Number of Shifts

       D. Secrecy of Key

Ans : Length of the Key

Q.2 The cipher generated by combining multiple transformations to enhance the security of the resultant cipher is __________.

       A. Transformation ciphers

       B. Polyalphabetic ciphers

       C. Block ciphers

       D. Product ciphers

Ans : Product ciphers

Q.3 In which of the following cryptographic methods is the order of the units in the data rearranged to form the ciphertext?

       A. Stream ciphers

       B. Transpositional ciphers

       C. Substitution ciphers

       D. Block ciphers

Ans : Transpositional ciphers

Q.4 Which of the following is most suitable to secure passwords?

       A. Encryption

       B. Non-repudiation

       C. Authorization

       D. Authentication

Ans : Encryption

Q.5 Which of the following is a pitfall in the Diffie-Hellman key exchange?

       A. Key refactoring

       B. Computational Complexity

       C. No Authentication

       D. Size of keys

Ans : No Authentication

Q.6 Secret Key Cryptography is effective for communication over insecure channels.

       A. True

       B. False

Ans : False

Q.7 RC4 is a block cipher.

       A. True

       B. False

Ans : False

Q.8 Which of the following is a major disadvantage of ECB mode?

       A. Lack of diffusion

       B. Simplicity

       C. Inefficient processing of large blocks

       D. Parallelism

Ans : Lack of diffusion

Q.9 The algorithm that is considered to have electrified non-military cryptology and cryptanalysis is ________.

       A. Vernam Cipher

       B. AES

       C. DES

       D. Caesar Cipher

Ans : Vernam Cipher

Q.10 The method adopted by block cipher modes to generate unique ciphertexts even if the same plaintext is encrypted multiple times is ________.

       A. Padding

       B. Initialization Vector

       C. Blockchain

       D. Random Keys

Ans : Initialization Vector

Q.11 Which among the following may be addressed using message authentication?

       A. Masquerade

       B. Content modification

       C. Sequence modification

       D. Timing modification

       E. All the options

Ans : All the options

Q.12 The Diffie-Hellman algorithm exploits the computational complexity of the __________ problem.

       A. Discrete logarithm

       B. Exponential logarithm

       C. Integer factorization

Ans : Discrete logarithm

Q.13 The number of keys used in Triple DES algorithm is __________.

       A. 2 or 3

       B. 3

       C. 1

       D. 2

Ans : 3

Q.14 Digital Signature is implemented using the __________.

       A. Public key system

       B. Keys are not used

       C. Symmetric key System

Ans : Public key system

Q.15 The size of the output produced by hash functions is __________

       A. Always 128 bits

       B. Non-deterministic

       C. Dependent on the size of the input block

       D. Fixed based on the hash algorithm

Ans : Fixed based on the hash algorithm

Q.16 Based on the network security protocols, which of the following algorithms are used to generate message digests?

       A. AES

       B. RSA

       C. MD5

       D. DES

Ans : MD5

Q.17 Select the mode in which computations do not depend on outputs from previous stages.

       A. Output Feedback Mode

       B. Cipher Feedback Mode

       C. Electronic Code Book

Ans : Electronic Code Book

Q.18 Which among the following algorithms is designed based on the Feistel Cipher?

       A. MD5

       B. AES

       C. RSA

       D. DES

Ans : DES

Q.19 In digital cryptography, each character is represented as__________.

       A. 8 bits

       B. 12 bits

       C. 1 bits

       D. 16 bits

Ans : 8 bits

Q.20 The most frequently used letters in the English language are __________.

       A. e,i

       B. i,t

       C. e,t

       D. a,e

Ans : e,i

Q.21 Kerchkoff’s principle emphasizes that the cryptosystem should be accessible to the adversary without inconvenience.

       A. True

       B. False

Ans : True

Q.22 The idea behind “confusion” in cryptography is to hide the relationship between the plaintext and ciphertext.

       A. True

       B. False

Ans : False

Q.23 The avalanche effect is an undesirable property in cryptographic algorithms.

       A. True

       B. False

Ans : False

Q.24 Which among the following is an active attack?

       A. Eavesdropping on network traffic

       B. Release of message content

       C. User Impersonation

       D. Accessing restricted data

Ans : User Impersonation

Q.25 The hash function value used in message authentication is also known as __________.

       A. Hash code

       B. Message Authentication Code

       C. Digital Signature

       D. Message Digest

Ans : Message Digest

Leave a Comment

Your email address will not be published. Required fields are marked *