Practice Test: Question Set - 01
1. In cryptography the original message before being transform is called
- (A) Simple
text
- (B) Plain
text
- (C) Empty
text
- (D) Filled
text
2. The message which is not understandable is called as?
- (A) Cipher
Text
- (B) Plain
text
- (C) Hidden
text
- (D) Both
(a) & (c)
3. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
- (A) Authenticated
- (B) Joined
- (C) Submit
- (D) Separate
4. The ________ is a polygraphic substitution cipher based on linear algebra
- (A) Hill
cipher
- (B) Playfair
cipher
- (C) Affine
cipher
- (D) None
of these
5. What is data encryption standard (DES)?
- (A) Block
cipher
- (B) Stream
cipher
- (C) Bit
cipher
- (D) Byte
cipher
6. AES stands for?
- (A) Authorized
Encryption Standard
- (B) Advance
Encryption Standard
- (C) Advance
Encryption Strategy
- (D) None
of these
7. In AES in which Round Sub-keys are generated from Original key for each round?
- (A) Key
Expansion
- (B) Initial
Round
- (C) Finale
Round
- (D) None
of these
8. ________is the practice of concealing a message within another message, image or file.
- (A) Steganography
- (B) Cryptography
- (C) Cipher
- (D) Receiver
9. An asymmetric-key (or public-key) cipher uses
- (A) 1
key
- (B) 2
key
- (C) 3
key
- (D) 4
key
10. In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
- (A) Short
- (B) Flat
- (C) Long
- (D) Thin
11. Which of them is type of Cipher?
- (A) Stream
Cipher
- (B) Block
Cipher
- (C) Both
of them
- (D) None
of these