MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
WHICH_IS_THE_LARGEST_DISADVANTAGE_OF_SYMMETRIC_ENCRYPTION??$ |
| A. | More complex and therefore more time-consuming calculations |
| B. | Problem of the secure transmission of the Secret Key |
| C. | Less secure encryption function |
| D. | Isn’t used any more |
| Answer» C. Less secure encryption function | |
| 2. |
Which_is_the_principle_of_the_encryption_using_a_key?$ |
| A. | The key indicates which function is used for encryption. Thereby it is more difficult to decrypt an intercepted message as the function is unknown |
| B. | The key contains the secret function for encryption including parameters. Only a password can activate the key |
| C. | All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption |
| D. | The key prevents the user of having to reinstall the software at each change in technology or in the functions for encryption |
| Answer» C. All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption | |
| 3. |
Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?# |
| A. | Not true, the message can also be decrypted with the Public Key |
| B. | A so called “one way function with back door” is applied for the encryption |
| C. | The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key |
| D. | The encrypted message contains the function for decryption which identifies the Private Key |
| Answer» C. The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key | |
| 4. |
Which of the following requires no password travel across the internet? |
| A. | Readable system |
| B. | Manipulation system |
| C. | Challenge–response system |
| D. | Response system |
| Answer» D. Response system | |
| 5. |
Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it? |
| A. | Round key algorithm |
| B. | Public key algorithm |
| C. | Advanced Encryption Standard |
| D. | Asymmetric key algorithm |
| Answer» D. Asymmetric key algorithm | |
| 6. |
Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________ |
| A. | Dictionary attacks |
| B. | Database attacks |
| C. | Minor attacks |
| D. | Random attacks |
| Answer» B. Database attacks | |
| 7. |
In which of the following encryption key is used to encrypt and decrypt the data? |
| A. | Public key |
| B. | Private key |
| C. | Symmetric key |
| D. | Asymmetric key |
| Answer» D. Asymmetric key | |
| 8. |
Which of the following is not a property of good encryption technique? |
| A. | Relatively simple for authorized users to encrypt and decrypt data |
| B. | Decryption key is extremely difficult for an intruder to determine |
| C. | Encryption depends on a parameter of the algorithm called the encryption key |
| D. | None of the mentioned |
| Answer» E. | |
| 9. |
In a database where the encryption is applied the data is cannot be handled by the unauthorised user without |
| A. | Encryption key |
| B. | Decryption key |
| C. | Primary key |
| D. | Authorised key |
| Answer» C. Primary key | |
| 10. |
___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks. |
| A. | Encryption |
| B. | Data mining |
| C. | Internet Security |
| D. | Architectural security |
| Answer» B. Data mining | |