InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The idea behind confusion in cryptography is to hide the relationship between the plaintext and ciphertext. |
|
Answer» The idea behind CONFUSION in cryptography is to hide the relationship between the plaintext and ciphertext. |
|
| 2. |
The Diffie-Hellman algorithm exploits the computational complexity of the __________ problem. |
|
Answer» The Diffie-Hellman algorithm exploits the computational complexity of the __________ problem. |
|
| 3. |
The strategy used to ensure that the message is a multiple of the cipher block size without compromising the size of the |
|
Answer» The strategy USED to ensure that the message is a multiple of the cipher block SIZE WITHOUT COMPROMISING the size of the ciphertext is ________. |
|
| 4. |
The hash function value used in message authentication is also known as __________ |
|
Answer» The hash function value used in MESSAGE AUTHENTICATION is also known as __________ |
|
| 5. |
The cipher generated by combining multiple transformations to enhance the security of the resultant cipher is __________. |
|
Answer» The CIPHER generated by combining multiple transformations to enhance the SECURITY of the resultant cipher is __________. |
|
| 6. |
RC4 is a block cipher. |
|
Answer» RC4 is a block cipher. Choose the correct OPTION from below list (1)FALSE (2)True Answer:-(1)False |
|
| 7. |
The primary goal of cryptanalysis is to __________. |
|
Answer» The primary goal of cryptanalysis is to __________. |
|
| 8. |
RSA is a Deterministic Encryption Algorithm as there is no random component. |
|
Answer» RSA is a Deterministic ENCRYPTION Algorithm as there is no random component. |
|
| 9. |
Kerchkoff s principle emphasizes that the cryptosystem should be accessible to the adversary without inconvenience. |
|
Answer» Kerchkoff s principle emphasizes that the CRYPTOSYSTEM should be accessible to the ADVERSARY without inconvenience. |
|
| 10. |
The use of hashing algorithms includes ________. |
|
Answer» The USE of hashing ALGORITHMS includes ________. |
|
| 11. |
What is the size of the hash value produced by the MD5 algorithm? |
|
Answer» What is the SIZE of the hash VALUE PRODUCED by the MD5 algorithm? |
|
| 12. |
The method adopted by block cipher modes to generate unique ciphertexts even if the same plaintext is encrypted multiple |
|
Answer» The METHOD adopted by BLOCK cipher modes to generate unique ciphertexts even if the same plaintext is encrypted multiple TIMES is________. |
|
| 13. |
Which of the following poses challenges in the breaking of the Vigen re Cipher? |
|
Answer» Which of the following poses challenges in the breaking of the Vigen re Cipher? |
|
| 14. |
The algorithm that is considered to have electrified non-military cryptology and cryptanalysis is ________. |
|
Answer» The algorithm that is CONSIDERED to have ELECTRIFIED non-military CRYPTOLOGY and CRYPTANALYSIS is ________. |
|
| 15. |
The process that attempts to understand the art and science of encryption and decryption is known as __________. |
|
Answer» The PROCESS that attempts to understand the art and SCIENCE of ENCRYPTION and decryption is known as __________. |
|
| 16. |
Encryption helps protect data against __________ |
|
Answer» Encryption helps PROTECT data against __________ |
|
| 17. |
In cryptographic terms, what does cipher indicate? |
|
Answer» In cryptographic terms, what does cipher indicate? |
|
| 18. |
Which of the following is a characteristic of block ciphers? |
|
Answer» Which of the following is a CHARACTERISTIC of block ciphers? |
|
| 19. |
Which of the following is widely used in cryptography to create a trapdoor function to facilitate the exchange of keys? |
|
Answer» Which of the FOLLOWING is widely USED in CRYPTOGRAPHY to create a trapdoor function to FACILITATE the exchange of keys? |
|
| 20. |
Digital Signature is implemented using the __________. |
|
Answer» Digital Signature is implemented USING the __________. |
|
| 21. |
The Diffie-Hellman algorithm is applicable for the exchange of keys between two parties only. |
|
Answer» The Diffie-Hellman algorithm is APPLICABLE for the exchange of keys between two parties only. |
|
| 22. |
Which of the following is most suitable to secure passwords? |
|
Answer» Which of the following is most suitable to SECURE passwords? |
|
| 23. |
The cryptographic device based on rotor systems, used by the Germans during World War II is __________. |
|
Answer» The CRYPTOGRAPHIC DEVICE based on rotor systems, used by the Germans during World War II is __________. |
|
| 24. |
Based on the network security protocols, which of the following algorithms are used to generate message digests? |
|
Answer» BASED on the network security protocols, which of the following ALGORITHMS are used to generate message digests? CHOOSE the CORRECT option from below list (1)DES (2)AES (3)MD5 (4)RSA Answer:-(3)MD5 |
|
| 25. |
The number of keys used in Triple DES algorithm is __________. |
|
Answer» The number of keys used in TRIPLE DES algorithm is __________. |
|
| 26. |
The avalanche effect is an undesirable property in cryptographic algorithms. |
|
Answer» The AVALANCHE effect is an UNDESIRABLE property in CRYPTOGRAPHIC algorithms. |
|
| 27. |
Select the mode in which computations do not depend on outputs from previous stages. |
|
Answer» Select the MODE in which computations do not depend on outputs from previous stages. |
|
| 28. |
Which among the following best describes hash collision attack? |
|
Answer» Which AMONG the FOLLOWING best describes hash collision attack? |
|
| 29. |
In which of the following cryptographic methods is the order of the units in the data rearranged to form the ciphertext? |
|
Answer» In which of the following CRYPTOGRAPHIC methods is the order of the units in the data REARRANGED to form the ciphertext? |
|
| 30. |
Which of the following is a major disadvantage of ECB mode? |
|
Answer» Which of the following is a major disadvantage of ECB mode? |
|
| 31. |
Which among the following may be addressed using message authentication? |
|
Answer» Which among the following may be addressed using message AUTHENTICATION? |
|
| 32. |
A widely used encryption algorithm that superseded DES as the new standard encryption algorithm is ________. |
|
Answer» A WIDELY used ENCRYPTION algorithm that superseded DES as the new standard encryption algorithm is ________. |
|
| 33. |
Which of the following is a pitfall in the |
|
Answer» Which of the following is a pitfall in the Diffie-Hellman key exchange? |
|
| 34. |
The security principle that contradicts the idea of security through obscurity is _________. |
|
Answer» The security principle that CONTRADICTS the idea of security through obscurity is _________. |
|
| 35. |
Secret Key Cryptography is effective for Communication over insecure channels. |
|
Answer» SECRET KEY Cryptography is effective for Communication over insecure channels. Choose the correct option from below list (1)True (2)False Answer:-(2)False |
|
| 36. |
Which of the following cryptographic strategies may be used to overcome Man-in-the-Middle attacks? |
|
Answer» Which of the FOLLOWING cryptographic strategies may be USED to overcome Man-in-the-Middle attacks? |
|