InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Choose from among the following cipher systems, from best to the worst, with respect to ease of decryption using frequency analysis.(a) Random Polyalphabetic, Plaintext, Playfair(b) Random Polyalphabetic, Playfair, Vignere(c) Random Polyalphabetic, Vignere, Playfair, Plaintext(d) Random Polyalphabetic, Plaintext, Beaufort, PlayfairThis question was addressed to me in an interview.This is a very interesting question from Substitution and Transposition Techniques in section Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» RIGHT option is (c) Random Polyalphabetic, Vignere, Playfair, PLAINTEXT Explanation: Random Polyalphabetic is the most resistant to FREQUENCY analysis, FOLLOWED by Vignere, Playfair and then Plaintext. |
|
| 2. |
Caesar Cipher is an example of(a) Poly-alphabetic Cipher(b) Mono-alphabetic Cipher(c) Multi-alphabetic Cipher(d) Bi-alphabetic CipherThis question was addressed to me in an online interview.This interesting question is from Substitution and Transposition Techniques topic in chapter Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» Right answer is (b) Mono-alphabetic Cipher |
|
| 3. |
Monoalphabetic ciphers are stronger than Polyalphabetic ciphers because frequency analysis is tougher on the former.(a) True(b) FalseThe question was asked in an interview for internship.This intriguing question originated from Substitution and Transposition Techniques topic in section Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» RIGHT answer is (B) False The explanation: Monoalphabetic CIPHERS are EASIER to break because they reflect the frequency of the original ALPHABET. |
|
| 4. |
The Index of Coincidence for English language is approximately(a) 0.068(b) 0.038(c) 0.065(d) 0.048This question was posed to me in exam.This intriguing question originated from Substitution and Transposition Techniques topic in portion Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» CORRECT CHOICE is (c) 0.065 Explanation: The IC for the English LANGUAGE is approximately 0.065. |
|
| 5. |
Reduce the following big-O natations:O[ ax7 + 3 x3 + sin(x)] =(a) O[ax^7](b) O[sin(x)].(c) O[x^7].(d) O[x^7 + x^3].I had been asked this question in an interview for internship.My question comes from Symmetric Cipher Models and Elementary Number Theory in chapter Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» The correct CHOICE is (c) O[x^7]. |
|
| 6. |
The estimated computations required to crack a password of 6 characters from the 26 letter alphabet is-(a) 308915776(b) 11881376(c) 456976(d) 8031810176This question was posed to me in quiz.My doubt is from Symmetric Cipher Models and Elementary Number Theory topic in section Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» CORRECT CHOICE is (a) 308915776 Best EXPLANATION: The REQUIRED ANSWER is 26^6 = 308915776. |
|
| 7. |
In base 26, multiplication of YES by NO gives –(a) THWOE(b) MPAHT(c) MPJNS(d) THWAEThe question was asked in exam.My query is from Symmetric Cipher Models and Elementary Number Theory topic in section Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» Right option is (C) MPJNS |
|
| 8. |
If all letters have the same chance of being chosen, the IC is approximately(a) 0.065(b) 0.035(c) 0.048(d) 0.038I have been asked this question in an international level competition.Question is from Substitution and Transposition Techniques topic in section Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» Right ANSWER is (d) 0.038 |
|
| 9. |
Divide (HAPPY)26 by (SAD)26. We get quotient –(a) KD(b) LD(c) JC(d) MCI had been asked this question in a job interview.My doubt stems from Symmetric Cipher Models and Elementary Number Theory in portion Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» RIGHT CHOICE is (a) KD Explanation: Dividing (HAPPY)26 by (SAD)26gives US KD with a remainder MLP. |
|
| 10. |
Division of(131B6C3) base 16 by (lA2F) base 16 yeilds –(a) 1AD(b) DAD(c) BAD(d) 9ADThis question was posed to me in a national level competition.Query is from Symmetric Cipher Models and Elementary Number Theory in division Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» Right OPTION is (d) 9AD |
|
| 11. |
Reduce the following big-O natations:O[ en + an10] =(a) O[ an^10 ](b) O[ n^10 ].(c) O[ e^n ].(d) O[ e^n + n^10 ].This question was addressed to me during an internship interview.Asked question is from Symmetric Cipher Models and Elementary Number Theory topic in chapter Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» CORRECT OPTION is (C) O[ e^n ]. The BEST I can EXPLAIN: O[ e^n + an^10] = O[ e^n ]. |
|
| 12. |
Reduce the following big-O natations:O [ n! + n^50 ] =(a) O [ n! + n^50 ](b) O [ n! ].(c) O [ n^50].(d) None of the MentionedThis question was posed to me in unit test.My enquiry is from Symmetric Cipher Models and Elementary Number Theory topic in section Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» CORRECT OPTION is (B) O [ N! ]. EXPLANATION: O [ n! + n^50 ] = O [ n! ]. |
|
| 13. |
The time required to convert a k-bit integer to its representation in the base 10 in terms of big-O notation is(a) O(log2 n)(b) O(log n)(c) O(log2 2n)(d) O(2log n)This question was posed to me in an online interview.This question is from Symmetric Cipher Models and Elementary Number Theory topic in portion Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» Correct answer is (a) O(log2 n) |
|
| 14. |
If the sender and receiver use different keys, the system is referred to as conventional cipher system.(a) True(b) FalseThis question was addressed to me in examination.This key question is from Symmetric Cipher Models and Elementary Number Theory in section Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» The correct OPTION is (b) False |
|
| 15. |
The Index of Coincidence is –(a) 0.065(b) 0.048(c) 0.067(d) 0.044This question was posed to me in examination.My doubt is from Substitution and Transposition Techniques in section Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» Correct CHOICE is (d) 0.044 |
|
| 16. |
An encryption scheme is unconditionally secure if the ciphertext generated does not contain enough information to determine uniquely the corresponding plaintext, no matter how much cipher text is available.(a) True(b) FalseThis question was posed to me during an interview for a job.Asked question is from Symmetric Cipher Models and Elementary Number Theory in section Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» The correct option is (a) True |
|
| 17. |
On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword “HUMOR” we get cipher text-(a) abqdnwewuwjphfvrrtrfznsdokvl(b) abqdvmwuwjphfvvyyrfznydokvl(c) tbqyrvmwuwjphfvvyyrfznydokvl(d) baiuvmwuwjphfoeiyrfznydokvlThe question was posed to me in class test.My doubt is from Substitution and Transposition Techniques topic in portion Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» Correct OPTION is (B) abqdvmwuwjphfvvyyrfznydokvl |
|
| 18. |
In brute force attack, on average half of all possible keys must be tried to achieve success.(a) True(b) FalseThis question was posed to me during an interview.My doubt is from Symmetric Cipher Models and Elementary Number Theory topic in portion Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» Correct answer is (a) True |
|
| 19. |
pi in terms of base 26 is(a) C.DRS(b) D.SQR(c) D.DRS(d) D.DSSI had been asked this question during a job interview.This key question is from Symmetric Cipher Models and Elementary Number Theory topic in chapter Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» RIGHT ANSWER is (c) D.DRS Easy explanation: On converting using base conversions we GET 3.1415926as D.DRS. |
|
| 20. |
Dividing (11001001) by (100111) gives remainder –(a) 11(b) 111(c) 101(d) 110The question was posed to me by my college director while I was bunking the class.The query is from Symmetric Cipher Models and Elementary Number Theory in portion Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» RIGHT choice is (d) 110 The explanation is: Dividing (11001001) by (100111) GIVES US (110). |
|
| 21. |
A symmetric cipher system has an IC of 0.041. What is the length of the key ‘m’?(a) 1(b) 3(c) 2(d) 5The question was posed to me during an interview.Question is taken from Substitution and Transposition Techniques in division Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» CORRECT CHOICE is (d) 5 For EXPLANATION I would say: USING the formula for calculating ‘m’ we GET m=5, where m≈0.027n/(I_c (n-1)-0.038n+0.065). |
|
| 22. |
On Encrypting “cryptography” using Vignere Cipher System using the keyword “LUCKY” we get cipher text(a) nlazeiibljji(b) nlazeiibljii(c) olaaeiibljki(d) mlaaeiibljkiThe question was asked in an online interview.The above asked question is from Substitution and Transposition Techniques in section Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» The CORRECT OPTION is (a) nlazeiibljji |
|
| 23. |
Which are the most frequently found letters in the English language ?(a) e,a(b) e,o(c) e,t(d) e,iThis question was posed to me during an interview.The question is from Substitution and Transposition Techniques in section Classical Encryption Techniques of Cryptograph & Network Security |
|
Answer» Right answer is (c) e,t |
|