MCQOPTIONS
Saved Bookmarks
This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Digital Communications knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
EXAMPLES_OF_HASH_FUNCTIONS_ARE?$ |
| A. | MD5 |
| B. | SHA-1 |
| C. | MD5 & SHA-1 |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 2. |
WHICH_ALGORITHM_CAN_BE_USED_TO_SIGN_A_MESSAGE??$ |
| A. | Public key algorithm |
| B. | Private key algorithm |
| C. | Public & Private key algorithm |
| D. | None of the mentioned |
| Answer» B. Private key algorithm | |
| 3. |
A set of numbers is called as super increasing if$ |
| A. | Each element is greater than previous element |
| B. | Each element greater than sum of all the previous elements |
| C. | Each element greater than the average of all elements |
| D. | Each element lesser than the sum of all the elements |
| Answer» C. Each element greater than the average of all elements | |
| 4. |
A cryptographic hash function has variable output length.$ |
| A. | True |
| B. | False |
| Answer» C. | |
| 5. |
In this Merkle Hellman method same key is used for encryption and decryption. |
| A. | True |
| B. | False |
| Answer» C. | |
| 6. |
Merkle hellman is a symmetric cryptosystem. |
| A. | True |
| B. | False |
| Answer» C. | |
| 7. |
Knapsack problem can be solved by |
| A. | Public key cryptosystem |
| B. | Private key cryptosystem |
| C. | Public & Private key cryptosystem |
| D. | None of the mentioned |
| Answer» B. Private key cryptosystem | |
| 8. |
Which has a key length of 128 bits? |
| A. | IDEA |
| B. | Triple-DES |
| C. | IDEA & Triple-DES |
| D. | None of the mentioned |
| Answer» B. Triple-DES | |
| 9. |
Which are called the block ciphers? |
| A. | IDEA |
| B. | CAST |
| C. | Triple-DES |
| D. | All of the mentioned |
| Answer» E. | |
| 10. |
Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption. |
| A. | Messages, session key |
| B. | Session key, messages |
| C. | Can be used for both |
| D. | None of the mentioned |
| Answer» B. Session key, messages | |
| 11. |
PGP system uses |
| A. | Private key system |
| B. | Public key system |
| C. | Private & Public key system |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 12. |
Pretty good privacy program is used for |
| A. | Electronic mails |
| B. | File encryption |
| C. | Electronic mails & File encryption |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 13. |
In a trapdoor function, the functions are easy to go in |
| A. | One direction |
| B. | Two directions |
| C. | All directions |
| D. | None of the mentioned |
| Answer» B. Two directions | |
| 14. |
In public key cryptosystem which is kept as public? |
| A. | Encryption keys |
| B. | Decryption keys |
| C. | Encryption & Decryption keys |
| D. | None of the mentioned |
| Answer» B. Decryption keys | |
| 15. |
In public key cryptosystem _____ keys are used for encryption and decryption. |
| A. | Same |
| B. | Different |
| C. | Encryption Keys |
| D. | None of the mentioned |
| Answer» C. Encryption Keys | |