MCQOPTIONS
Saved Bookmarks
This section includes 16 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Networks knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
An electronic document that establishes your credentials when you are performing transactions. |
| A. | Digital code |
| B. | OTP |
| C. | |
| D. | Digital certificate |
| Answer» E. | |
| 2. |
Encryption standard that is selected by the US government to replace DES. |
| A. | AES |
| B. | BES |
| C. | CES |
| D. | DES |
| Answer» B. BES | |
| 3. |
Triple-DES has ______ keys. |
| A. | 1 |
| B. | 2 |
| C. | 5 |
| D. | 4 |
| Answer» C. 5 | |
| 4. |
These ciphers replace a character or characters with a different character or characters, based on some key. |
| A. | Polyalphabetic substitution based |
| B. | Transposition-based |
| C. | Substitution based |
| D. | Mono alphabetic substitution based |
| Answer» E. | |
| 5. |
ENCRYPTION_STANDARD_THAT_IS_SELECTED_BY_THE_US_GOVERNMENT_TO_REPLACE_DES.?$ |
| A. | AES |
| B. | BES |
| C. | CES |
| D. | DES |
| Answer» B. BES | |
| 6. |
ELGAMAL_ENCRYPTION_SYSTEM_IS?$ |
| A. | symmetric key encryption algorithm |
| B. | asymmetric key encryption algorithm |
| C. | not an encryption algorithm |
| D. | none of the mentioned |
| Answer» C. not an encryption algorithm | |
| 7. |
An electronic document that establishes your credentials when you are performing transactions.$ |
| A. | Digital code |
| B. | OTP |
| C. | |
| D. | Digital certificate |
| Answer» E. | |
| 8. |
Cryptographic_hash_function_takes_an_arbitrary_block_of_data_and_returns$ |
| A. | fixed size bit string |
| B. | variable size bit string |
| C. | both fixed size bit string and variable size bit string |
| D. | none of the mentioned |
| Answer» B. variable size bit string | |
| 9. |
Triple-DES has ______ keys? |
| A. | 1 |
| B. | 2 |
| C. | 5 |
| D. | 4 |
| Answer» C. 5 | |
| 10. |
Voice privacy in GSM cellular telephone protocol is provided b? |
| A. | A5/2 cipher |
| B. | b5/4 cipher |
| C. | b5/6 cipher |
| D. | b5/8 cipher |
| Answer» B. b5/4 cipher | |
| 11. |
Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption. |
| A. | 64 |
| B. | 8 |
| C. | 16 |
| D. | 4 |
| Answer» D. 4 | |
| 12. |
DES stands for? |
| A. | Data Encryption Standard |
| B. | Data Encryption Statistics |
| C. | Data Encryption System |
| D. | Data Encryption Sequence |
| Answer» B. Data Encryption Statistics | |
| 13. |
In public key cryptography, a key that decrypts the message. |
| A. | public key |
| B. | unique key |
| C. | private key |
| D. | security key |
| Answer» D. security key | |
| 14. |
An encryption technique with 2 keys is ______________ |
| A. | Monoalphabetic Cipher |
| B. | Cryptography |
| C. | Private key cryptography |
| D. | Public key cryptography |
| Answer» E. | |
| 15. |
A type of cipher that uses multiple alphabetic strings. |
| A. | Substitution based |
| B. | Transposition-based |
| C. | Polyalphabetic substitution based |
| D. | Mono alphabetic substitution based |
| Answer» D. Mono alphabetic substitution based | |
| 16. |
Encryption is the study of creating and using decryption techniques. |
| A. | True |
| B. | False |
| Answer» C. | |