Cryptography MCQs

Cryptography MCQs

These Cryptography multiple-choice questions and their answers will help you strengthen your grip on the subject of Cryptography. You can prepare for an upcoming exam or job interview with these 20 Cryptography MCQs.
So scroll down and start answering.

1: What is Cryptography?

A.   Study Communications

B.   Secure Communications

C.   Both A and B

D.   None of the above

2: Caesar Cipher is an example of

A.   Poly-alphabetic Cipher

B.   Bi-alphabetic Cipher

C.   Mono-alphabetic Cipher

D.   Multi-alphabetic Cipher

3: An asymmetric-key cipher uses

A.   1 key

B.   2 key

C.   3 key

D.   4 key

4: The shift cipher is sometimes referred to as the

A.   Cipher

B.   Shift cipher

C.   Caesar cipher

D.   Cipher text

5: The substitutional ciphers are

A.   Bialphabetic

B.   Polyalphabetic

C.   Semi alphabetic

D.   Monoalphabatic

6: The Acronym DES stands for

A.   Digital Encryption System

B.   Digital Evaluation System

C.   Digital Encryption Standard

D.   Double Encryption Standard

7: Cryptography, a word with Greek origins, means

A.   Open Writing

B.   Secret Writing

C.   Closed Writing

D.   Corrupting Data

8: Cryptography can provide

A.   Confidentiality

B.   Entity authentication

C.   Nonrepudiation of messages

D.   All of above

9: WTLS stands for?

A.   Wireless Transfer System Layer

B.   Wireless Transfer Security Layer

C.   Wireless Transport System Layer

D.   Wireless Transport Security Layer

10: Which one is the Heart of Data Encryption Standard

A.   Cipher

B.   Rounds

C.   Encryption

D.   DES function

11: A mechanism used to encrypt and decrypt data

A.   Data flow

B.   Algorithm

C.   Cryptography

D.   None of the above

12: PKI stands for ________

A.   Public key instance

B.   Private key instance

C.   Public key infrastructure

D.   Private key infrastructure

13: ECB and CBC are ________ ciphers.

A.   Field

B.   Block

C.   Stream

D.   None of the above

14: DES function has _______ components

A.   1

B.   2

C.   3

D.   4

15: Who started cryptography?

A.   Oracle

B.   Spartans

C.   React

D.   All of above

16: MALWARE stand for________

A.   Malicious Software

B.   Multipurpose Software

C.   Malfunctioned Software

D.   All of above

17: Electronic Code Book process is used in ________

A.   Caesar cipher

B.   Block cipher

C.   Antisymmetric cipher

D.   Stream cipher

18: What is the block size of blowfish block cipher?

A.   10 bits

B.   12 bits

C.   24 bits

D.   64 bits

19: There is no secret key in case of _______

A.   RSA encryption

B.   Symmetric ciphers

C.   Asymmetric ciphers

D.   Alpha-numeric cryptography

20: Symmetric-key cryptography is mainly used in our network security

A.   True

B.   False

21: Bit stream methods commonly use algorithm functions like the exclusive or operation (__________).

A.   XOR

B.   RSA

C.   MAC

D.   CRL

22: The concept of two keys, public and private, is called ____ cryptography.

A.   Symmetric

B.   Packet

C.   Public key

D.   Circuit-switched

23: ____ encryption is also called symmetric key encryption.

A.   Shared key

B.   Private key

C.   Symmetric key

D.   Public key

24: The __________ polyalphabetic cypher uses 26 alphabets.

A.   Vigenere

B.   Enigma

C.   Scytale

D.   Alberti