Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

The idea behind confusion in cryptography is to hide the relationship between the plaintext and ciphertext.

Answer»

The idea behind CONFUSION in cryptography is to hide the relationship between the plaintext and ciphertext.
Select the correct option from below LIST
(1)TRUE
(2)FALSE

Answer:-(2)False

2.

The Diffie-Hellman algorithm exploits the computational complexity of the __________ problem.

Answer»

The Diffie-Hellman algorithm exploits the computational complexity of the __________ problem.
Select correct option from below LIST
(1)DISCRETE LOGARITHM
(2)Integer factorization
(3)Exponential logarithm

Answer:-(1)Discrete logarithm

3.

The strategy used to ensure that the message is a multiple of the cipher block size without compromising the size of the

Answer»

The strategy USED to ensure that the message is a multiple of the cipher block SIZE WITHOUT COMPROMISING the size of the ciphertext is ________.
Choose the correct option from below list
(1)Ciphertext stealing
(2)Padding
(3)Refactoring
(4)Diffusion

Answer:-(1)Ciphertext stealing

4.

The hash function value used in message authentication is also known as __________

Answer»

The hash function value used in MESSAGE AUTHENTICATION is also known as __________
Select correct option from below list
(1)Hash CODE
(2)DIGITAL Signature
(3)Message Authentication Code
(4)Message Digest

Answer:-(4)Message Digest

5.

The cipher generated by combining multiple transformations to enhance the security of the resultant cipher is __________.

Answer»

The CIPHER generated by combining multiple transformations to enhance the SECURITY of the resultant cipher is __________.
Choose the CORRECT option from below list
(1)BLOCK ciphers
(2)Polyalphabetic ciphers
(3)Transformation ciphers
(4)Product ciphers

Answer:-(4)Product ciphers

6.

RC4 is a block cipher.

Answer» RC4 is a block cipher.
Choose the correct OPTION from below list
(1)FALSE
(2)True

Answer:-(1)False
7.

The primary goal of cryptanalysis is to __________.

Answer»

The primary goal of cryptanalysis is to __________.
Select the correct option from below list
(1)FIND the INSECURITIES of the cryptosystem
(2)Understand the design of the cryptosystem
(3)ANALYZE the efficiency of the cryptosystem
(4)Break the cryptosystem

Answer:-(1)Find the insecurities of the cryptosystem

8.

RSA is a Deterministic Encryption Algorithm as there is no random component.

Answer»

RSA is a Deterministic ENCRYPTION Algorithm as there is no random component.
Choose the CORRECT option from below list
(1)TRUE
(2)False

Answer:-(1)True

9.

Kerchkoff s principle emphasizes that the cryptosystem should be accessible to the adversary without inconvenience.

Answer»

Kerchkoff s principle emphasizes that the CRYPTOSYSTEM should be accessible to the ADVERSARY without inconvenience.
Choose the correct option from below LIST
(1)FALSE
(2)True

Answer:-(2)True

10.

The use of hashing algorithms includes ________.

Answer»

The USE of hashing ALGORITHMS includes ________.
CHOOSE the correct option from below list
(1)Monitoring data integrity
(2)All the options
(3)Data Authentication
(4)Storing passwords

Answer:-(2)All the options

11.

What is the size of the hash value produced by the MD5 algorithm?

Answer»

What is the SIZE of the hash VALUE PRODUCED by the MD5 algorithm?
Choose the correct option from below list
(1)256 bits
(2)Depends on the size of the input
(3)64 bits
(4)128 bits

Answer:-(4)128 bits

12.

The method adopted by block cipher modes to generate unique ciphertexts even if the same plaintext is encrypted multiple

Answer»

The METHOD adopted by BLOCK cipher modes to generate unique ciphertexts even if the same plaintext is encrypted multiple TIMES is________.
Choose the CORRECT option from below list
(1)Initialization Vector
(2)Random Keys
(3)Padding
(4)Blockchain

Answer:-(1)Initialization Vector

13.

Which of the following poses challenges in the breaking of the Vigen re Cipher?

Answer»

Which of the following poses challenges in the breaking of the Vigen re Cipher?
Choose the correct option from below list
(1)NUMBER of SHIFTS
(2)Secrecy of Key
(3)Length of the Key
(4)FREQUENCY Analysis

Answer:-(3)Length of the Key

14.

The algorithm that is considered to have electrified non-military cryptology and cryptanalysis is ________.

Answer»

The algorithm that is CONSIDERED to have ELECTRIFIED non-military CRYPTOLOGY and CRYPTANALYSIS is ________.
Choose the correct option from below list
(1)DES
(2)AES
(3)Caesar CIPHER
(4)Vernam Cipher

Answer:-(4)Vernam Cipher

15.

The process that attempts to understand the art and science of encryption and decryption is known as __________.

Answer»

The PROCESS that attempts to understand the art and SCIENCE of ENCRYPTION and decryption is known as __________.
Choose the correct OPTION from below list
(1)Cryptography
(2)CRYPTOLOGY
(3)Cryptanalysis

Answer:-(2)Cryptology

16.

Encryption helps protect data against __________

Answer»

Encryption helps PROTECT data against __________
Choose the correct OPTION from below LIST
(1)All the options
(2)Manipulation of data
(3)Forgery
(4)Viruses

Answer:-(2)Manipulation of data

17.

In cryptographic terms, what does cipher indicate?

Answer»

In cryptographic terms, what does cipher indicate?
Choose the CORRECT option from below list
(1)The encrypted data
(2)Both the options
(3)The algorithm used for ENCRYPTION and decryption

Answer:-(3)The algorithm used for encryption and decryption

18.

Which of the following is a characteristic of block ciphers?

Answer»

Which of the following is a CHARACTERISTIC of block ciphers?
Choose the correct option from below LIST
(1)Data/key independent ROTATION
(2)Key DEPENDENT S-boxes
(3)Simple key scheduling
(4)FIXED key length/Key size/Number of rounds

Answer:-(2)Key dependent S-boxes

19.

Which of the following is widely used in cryptography to create a trapdoor function to facilitate the exchange of keys?

Answer»

Which of the FOLLOWING is widely USED in CRYPTOGRAPHY to create a trapdoor function to FACILITATE the exchange of keys?
Choose the correct option from below list
(1)Random Number generation
(2)Modular Arithmetic
(3)Elliptic CURVES
(4)Factorization

Answer:-(4)Factorization

20.

Digital Signature is implemented using the __________.

Answer»

Digital Signature is implemented USING the __________.
Choose the correct OPTION from below list
(1)SYMMETRIC KEY System
(2)Keys are not used
(3)PUBLIC key system

Answer:-(3)Public key system

21.

The Diffie-Hellman algorithm is applicable for the exchange of keys between two parties only.

Answer»

The Diffie-Hellman algorithm is APPLICABLE for the exchange of keys between two parties only.
Select CORRECT OPTION from below list
(1)True
(2)FALSE

Answer:-(2)False

22.

Which of the following is most suitable to secure passwords?

Answer»

Which of the following is most suitable to SECURE passwords?
CHOOSE the correct OPTION from below LIST
(1)Non-repudiation
(2)Encryption
(3)Authorization
(4)Authentication

Answer:-(2)Encryption

23.

The cryptographic device based on rotor systems, used by the Germans during World War II is __________.

Answer»

The CRYPTOGRAPHIC DEVICE based on rotor systems, used by the Germans during World War II is __________.
CHOOSE the correct option from below LIST
(1)KL-7
(2)NEMA machine
(3)Typex
(4)Enigma

Answer:-(4)Enigma

24.

Based on the network security protocols, which of the following algorithms are used to generate message digests?

Answer» BASED on the network security protocols, which of the following ALGORITHMS are used to generate message digests?
CHOOSE the CORRECT option from below list
(1)DES
(2)AES
(3)MD5
(4)RSA

Answer:-(3)MD5
25.

The number of keys used in Triple DES algorithm is __________.

Answer»

The number of keys used in TRIPLE DES algorithm is __________.
Select the correct option from below list
(1)2
(2)2 or 3
(3)3
(4)1

Answer:-(3)3

26.

The avalanche effect is an undesirable property in cryptographic algorithms.

Answer»

The AVALANCHE effect is an UNDESIRABLE property in CRYPTOGRAPHIC algorithms.
Choose the correct option from below list
(1)True
(2)FALSE

Answer:-(2)False

27.

Select the mode in which computations do not depend on outputs from previous stages.

Answer»

Select the MODE in which computations do not depend on outputs from previous stages.
Choose the CORRECT option from below list
(1)Cipher Feedback Mode
(2)OUTPUT Feedback Mode
(3)ELECTRONIC Code BOOK

Answer:-(3)Electronic Code Book

28.

Which among the following best describes hash collision attack?

Answer»

Which AMONG the FOLLOWING best describes hash collision attack?
Select the correct option from below list
(1)DIFFERENT hash results when the same input is hashed multiple times
(2)The same hash result when the same input is hashed multiple times
(3)Different input strings, same hash result
(4)Same input STRING, different hash results

Answer:-(3)Different input strings, same hash result

29.

In which of the following cryptographic methods is the order of the units in the data rearranged to form the ciphertext?

Answer»

In which of the following CRYPTOGRAPHIC methods is the order of the units in the data REARRANGED to form the ciphertext?
(1)Substitution ciphers
(2)Block ciphers
(3)Stream ciphersTransmission ERRORS are propagated in the following modes, EXCEPT
(4)Transpositional ciphers

Answer:-(4)Transpositional ciphers

30.

Which of the following is a major disadvantage of ECB mode?

Answer»

Which of the following is a major disadvantage of ECB mode?
Choose the correct OPTION from below list
(1)LACK of diffusion
(2)PARALLELISM
(3)Simplicity
(4)Inefficient processing of large blocks

Answer:-(1)Lack of diffusion

31.

Which among the following may be addressed using message authentication?

Answer»

Which among the following may be addressed using message AUTHENTICATION?
Choose the correct option from below list
(1)Content modification
(2)Sequence modification
(3)All the OPTIONS
(4)Timing modification
(5)Masquerade

Answer:-(3)All the options

32.

A widely used encryption algorithm that superseded DES as the new standard encryption algorithm is ________.

Answer»

A WIDELY used ENCRYPTION algorithm that superseded DES as the new standard encryption algorithm is ________.
Choose the correct OPTION from below list
(1)IDEA
(2)3DES
(3)Twofish
(4)Rijndael

Answer:-(4)Rijndael

33.

Which of the following is a pitfall in the

Answer»

Which of the following is a pitfall in the Diffie-Hellman key exchange?
Choose the CORRECT option from below LIST
(1)No Authentication
(2)Size of keys
(3)COMPUTATIONAL COMPLEXITY
(4)Key refactoring

Answer:-(1)No Authentication

34.

The security principle that contradicts the idea of security through obscurity is _________.

Answer»

The security principle that CONTRADICTS the idea of security through obscurity is _________.
Choose the CORRECT option from below list
(1)Confidentiality
(2)Non-repudiation
(3)Kerchoff s Principle
(4)SHANNON s maxim

Answer:-(3)Kerchoff s Principle

35.

Secret Key Cryptography is effective for Communication over insecure channels.

Answer» SECRET KEY Cryptography is effective for Communication over insecure channels.
Choose the correct option from below list
(1)True
(2)False

Answer:-(2)False
36.

Which of the following cryptographic strategies may be used to overcome Man-in-the-Middle attacks?

Answer»

Which of the FOLLOWING cryptographic strategies may be USED to overcome Man-in-the-Middle attacks?
Choose the correct option from below list
(1)Authentication
(2)Authorization
(3)CONFUSION
(4)Encryption

Answer:-(1)Authentication

37.

Frequency analysis can be performed on polyalphabetic ciphers, which makes it weak.

Answer» FREQUENCY analysis can be performed on polyalphabetic ciphers, which MAKES it weak.
Choose the correct OPTION from below list
(1)FALSE
(2)True

Answer:-(2)True