Cyber Security Multiple Choice Questions on “Types of Cryptography”.
1. _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
a) Malware Analysis
b) Exploit writing
c) Reverse engineering
d) Cryptography
Answer: d
Clarification: Cryptography is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. It is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
2. ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
a) Malware Analysis
b) Cryptography
c) Reverse engineering
d) Exploit writing
Answer: b
Clarification: Cryptography is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it where “kryptos” means secret, “graphein” means to-write.
3. When plain text is converted to unreadable format, it is termed as _____________
a) rotten text
b) raw text
c) cipher-text
d) ciphen-text
Answer: c
Clarification: Cryptography helps in securing information in a specific format so that only intended users can understand or process it. When plain text is converted to the unreadable format, that type of text is termed as cipher-text.
4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
a) secret key
b) external programs
c) add-ons
d) secondary key
Answer: a
Clarification: When plain text is converted to unreadable format through some algorithms, that type of text is termed as cipher text. Cryptographic algorithms are based on mathematical algorithms where these algorithms use the secret key for a secure transformation of data.
5. Cryptography can be divided into ______ types.
a) 5
b) 4
c) 3
d) 2
Answer: d
Clarification: Cryptography can be divided into two types. These are classic cryptography & modern cryptography. Using these techniques, users can secure their information from illegitimate ones.
6. Data which is easily readable & understandable without any special algorithm or method is called _________________
a) cipher-text
b) plain text
c) raw text
d) encrypted text
Answer: b
Clarification: The means of storing or sending data in a specific format so that only intended users can process it is called cryptography. Data which is easily readable & understandable without any special algorithm or method is called plain text.
7. Plain text are also called _____________
a) cipher-text
b) raw text
c) clear-text
d) encrypted text
Answer: c
Clarification: Data which is easily readable & understandable without any special algorithm or method is called plain text or clear-text. This text is not secured and can be readable by anyone who is not even a legitimate user.
8. There are ________ types of cryptographic techniques used in general.
a) 2
b) 3
c) 4
d) 5
Answer: b
Clarification: There are three types of cryptographic techniques used in general. These are Symmetric Key cryptography, public key cryptography, and Hash functions based cryptography.
9. Conventional cryptography is also known as _____________ or symmetric-key encryption.
a) secret-key
b) public key
c) protected key
d) primary key
Answer: a
Clarification: The various cryptographic techniques are symmetric Key cryptography, public key cryptography, and Hash functions based cryptography. Conventional cryptography is also known as secret-key cryptography or symmetric-key encryption.
10. Data Encryption Standard is an example of a _____________ cryptosystem.
a) conventional
b) public key
c) hash key
d) asymmetric-key
Answer: a
Clarification: Conventional cryptography is also known as secret-key cryptography or symmetric-key encryption. Data Encryption Standard is an example of a conventional cryptosystem.
11. _______________ cryptography deals with traditional characters, i.e., letters & digits directly.
a) Modern
b) Classic
c) Asymmetric
d) Latest
Answer: b
Clarification: Cryptography can be divided into two types. These are classic cryptography & modern cryptography. Classic cryptography deals with traditional characters, i.e., letters & digits directly.
12. ____________ cryptography operates on binary-bit series and strings.
a) Modern
b) Classic
c) Traditional
d) Primitive
Answer: a
Clarification: Cryptography can be divided into two types. These are classic cryptography & modern cryptography. Modern cryptography operates on binary-bit series and strings.
13. __________ cryptography has always been focussing on the concept of ‘security through obscurity’.
a) Modern
b) Asymmetric
c) Classic
d) Latest
Answer: c
Clarification: Cryptography can be divided into two types. These are classic cryptography & modern cryptography. Classic cryptography deals with traditional characters, i.e., letters & digits directly. It is based on the concept of ‘security through obscurity’.
14. ________________ cryptography is based on publicly known mathematically designed algorithms to encrypt the information.
a) Modern
b) Classic
c) Traditional
d) Primitive
Answer: a
Clarification: There are 2 types of cryptography – classic cryptography & modern cryptography. Modern cryptography operates on binary-bit series and strings. It is based on publicly known mathematically designed algorithms to encrypt the information.