## 21. In cryptography, what is cipher?

- Encrypted message
- Algorithm for performing encrption and decryption
- Both (A) and (B)
- Decrypted message

Answer : B

Explanation: In cryptography, Cipher is an algorithm for performing encrption and decryption.

## 22. In public key encryption, if A wants to send an encrypted message

- A encrypts message using B’s public key
- A encrypts message using his private key
- A encrypts message using B’s private key
- A encrypts message using his public key

Answer : A

Explanation: In public key encryption, if A wants to send an encrypted message, he will encrypt message using B’s public key.

## 23. Symmetric-key cryptography started thousands of years ago when people needed to exchange

- Files
- Packets
- Transmission
- Secrets

Answer : D

Explanation: Symmetric-key cryptography started thousands of years ago when people needed to exchange Secrets.

## 24. Which of the following is not a type of symmetric-key cryptography technique?

- Diffie hellman cipher
- Caesar cipher
- Data encryption standard (DES)
- Playfair cipher

Answer : D

Explanation: Diffie hellman cipher is not a type of symmetric-key cryptography technique. All other mentioned are a type of symmetric-key cryptography technique.

## 25. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not

- Joined
- Authenticated
- Submit
- Separate

Answer : B

Explanation: The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not Authenticated.

Software Engineering MCQ Questions and Answers

## 26. In a/an ________ cipher, a pair of keys is used

- Asymmetric-key
- Symmetric-key
- Both (A) and (B)
- None of the above

Answer : A

Explanation: In an asymmetric-key cipher, a pair of keys is used.

## 27. Cryptanalysis is used

- To increase the speed
- To encrypt the data
- To find some insecurity in a cryptographic scheme
- To make new ciphers

Answer : C

Explanation: Cryptanalysis is used to find some insecurity in a cryptographic scheme. So, option C is correct.

## 28. In Cryptography, when text is treated at the bit level, each character is replaced by

- 4 bits
- 6 bits
- 10 bits
- 8 bits

Answer : D

Explanation: In Cryptography, when text is treated at the bit level, each character is replaced by 8 bits. So, option D is correct.

## 29. Hashed message is signed by a sender using

- His/her private key
- His/her public key
- Receiver’s public key
- Receiver’s private key

Answer : A

Explanation: Hashed message is signed by a sender using her/his private key.

## 30. The shift cipher is sometimes reffered to as a

- Move cipher
- Caesar cipher
- Cipher
- Cipher text

Answer : B

Explanation: The shift cipher is sometimes reffered to as a Caesar cipher.

Pingback: Project Management MCQ Questions And Answers | Software Project Management MCQ - cozmocard