21. In cryptography, what is cipher?
- Encrypted message
- Algorithm for performing encrption and decryption
- Both (A) and (B)
- Decrypted message
Answer : B Explanation: In cryptography, Cipher is an algorithm for performing encrption and decryption.
22. In public key encryption, if A wants to send an encrypted message
- A encrypts message using B’s public key
- A encrypts message using his private key
- A encrypts message using B’s private key
- A encrypts message using his public key
Answer : A Explanation: In public key encryption, if A wants to send an encrypted message, he will encrypt message using B’s public key.
23. Symmetric-key cryptography started thousands of years ago when people needed to exchange
- Files
- Packets
- Transmission
- Secrets
Answer : D Explanation: Symmetric-key cryptography started thousands of years ago when people needed to exchange Secrets.
24. Which of the following is not a type of symmetric-key cryptography technique?
- Diffie hellman cipher
- Caesar cipher
- Data encryption standard (DES)
- Playfair cipher
Answer : D Explanation: Diffie hellman cipher is not a type of symmetric-key cryptography technique. All other mentioned are a type of symmetric-key cryptography technique.
25. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
- Joined
- Authenticated
- Submit
- Separate
Answer : B Explanation: The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not Authenticated.
Software Engineering MCQ Questions and Answers
26. In a/an ________ cipher, a pair of keys is used
- Asymmetric-key
- Symmetric-key
- Both (A) and (B)
- None of the above
Answer : A Explanation: In an asymmetric-key cipher, a pair of keys is used.
27. Cryptanalysis is used
- To increase the speed
- To encrypt the data
- To find some insecurity in a cryptographic scheme
- To make new ciphers
Answer : C Explanation: Cryptanalysis is used to find some insecurity in a cryptographic scheme. So, option C is correct.
28. In Cryptography, when text is treated at the bit level, each character is replaced by
- 4 bits
- 6 bits
- 10 bits
- 8 bits
Answer : D Explanation: In Cryptography, when text is treated at the bit level, each character is replaced by 8 bits. So, option D is correct.
29. Hashed message is signed by a sender using
- His/her private key
- His/her public key
- Receiver’s public key
- Receiver’s private key
Answer : A Explanation: Hashed message is signed by a sender using her/his private key.
30. The shift cipher is sometimes reffered to as a
- Move cipher
- Caesar cipher
- Cipher
- Cipher text
Answer : B Explanation: The shift cipher is sometimes reffered to as a Caesar cipher.