Q.1 Which of the following poses challenges in the breaking of the Vigenère Cipher?
A. Length of the Key
B. Frequency Analysis
C. Number of Shifts
D. Secrecy of Key
Ans : Length of the Key
Q.2 The cipher generated by combining multiple transformations to enhance the security of the resultant cipher is __________.
A. Transformation ciphers
B. Polyalphabetic ciphers
C. Block ciphers
D. Product ciphers
Ans : Product ciphers
Q.3 In which of the following cryptographic methods is the order of the units in the data rearranged to form the ciphertext?
A. Stream ciphers
B. Transpositional ciphers
C. Substitution ciphers
D. Block ciphers
Ans : Transpositional ciphers
Q.4 Which of the following is most suitable to secure passwords?
A. Encryption
B. Non-repudiation
C. Authorization
D. Authentication
Ans : Encryption
Q.5 Which of the following is a pitfall in the Diffie-Hellman key exchange?
A. Key refactoring
B. Computational Complexity
C. No Authentication
D. Size of keys
Ans : No Authentication
Q.6 Secret Key Cryptography is effective for communication over insecure channels.
A. True
B. False
Ans : False
Q.7 RC4 is a block cipher.
A. True
B. False
Ans : False
Q.8 Which of the following is a major disadvantage of ECB mode?
A. Lack of diffusion
B. Simplicity
C. Inefficient processing of large blocks
D. Parallelism
Ans : Lack of diffusion
Q.9 The algorithm that is considered to have electrified non-military cryptology and cryptanalysis is ________.
A. Vernam Cipher
B. AES
C. DES
D. Caesar Cipher
Ans : Vernam Cipher
Q.10 The method adopted by block cipher modes to generate unique ciphertexts even if the same plaintext is encrypted multiple times is ________.
A. Padding
B. Initialization Vector
C. Blockchain
D. Random Keys
Ans : Initialization Vector
Q.11 Which among the following may be addressed using message authentication?
A. Masquerade
B. Content modification
C. Sequence modification
D. Timing modification
E. All the options
Ans : All the options
Q.12 The Diffie-Hellman algorithm exploits the computational complexity of the __________ problem.
A. Discrete logarithm
B. Exponential logarithm
C. Integer factorization
Ans : Discrete logarithm
Q.13 The number of keys used in Triple DES algorithm is __________.
A. 2 or 3
B. 3
C. 1
D. 2
Ans : 3
Q.14 Digital Signature is implemented using the __________.
A. Public key system
B. Keys are not used
C. Symmetric key System
Ans : Public key system
Q.15 The size of the output produced by hash functions is __________
A. Always 128 bits
B. Non-deterministic
C. Dependent on the size of the input block
D. Fixed based on the hash algorithm
Ans : Fixed based on the hash algorithm
Q.16 Based on the network security protocols, which of the following algorithms are used to generate message digests?
A. AES
B. RSA
C. MD5
D. DES
Ans : MD5
Q.17 Select the mode in which computations do not depend on outputs from previous stages.
A. Output Feedback Mode
B. Cipher Feedback Mode
C. Electronic Code Book
Ans : Electronic Code Book
Q.18 Which among the following algorithms is designed based on the Feistel Cipher?
A. MD5
B. AES
C. RSA
D. DES
Ans : DES
Q.19 In digital cryptography, each character is represented as__________.
A. 8 bits
B. 12 bits
C. 1 bits
D. 16 bits
Ans : 8 bits
Q.20 The most frequently used letters in the English language are __________.
A. e,i
B. i,t
C. e,t
D. a,e
Ans : e,i
Q.21 Kerchkoff’s principle emphasizes that the cryptosystem should be accessible to the adversary without inconvenience.
A. True
B. False
Ans : True
Q.22 The idea behind “confusion” in cryptography is to hide the relationship between the plaintext and ciphertext.
A. True
B. False
Ans : False
Q.23 The avalanche effect is an undesirable property in cryptographic algorithms.
A. True
B. False
Ans : False
Q.24 Which among the following is an active attack?
A. Eavesdropping on network traffic
B. Release of message content
C. User Impersonation
D. Accessing restricted data
Ans : User Impersonation
Q.25 The hash function value used in message authentication is also known as __________.
A. Hash code
B. Message Authentication Code
C. Digital Signature
D. Message Digest
Ans : Message Digest