InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
What is the basic unit of time measurement in Morse code transmission?(a) Dot duration(b) Dash Duration(c) Numeric Duration(d) Space DurationThe question was posed to me in an internship interview.This question is from Morse Code in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct option is (a) Dot duration |
|
| 52. |
Morse Code is named after which scientist?(a) Samuel F. B. Morse(b) Karl Morse(c) Judea Pearl(d) Daniel C. MorseThe question was posed to me in final exam.This intriguing question comes from Morse Code in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Right option is (a) Samuel F. B. Morse |
|
| 53. |
Which of the following is used as signal duration in Morse Code?(a) Dash(b) Forward Slash(c) Apostrophe(d) AmpersandThis question was posed to me by my college professor while I was bunking the class.I'd like to ask this question from Morse Code topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Right OPTION is (a) DASH |
|
| 54. |
What is the length of the dot in Morse code?(a) 1 Unit(b) 7 Units(c) 5 Units(d) 3 UnitsThe question was asked during an interview.Question is from Morse Code topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Right choice is (d) 3 Units |
|
| 55. |
What will be the plain text corresponding to ciphered text “BKC” if the bifid cipher is used for encryption with key as “KEY” and period 5?(a) MSD(b) SRT(c) KVK(d) VVSI got this question in final exam.This question is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT option is (c) KVK |
|
| 56. |
What will be the plain text corresponding to cipher text “XKS” if the bifid cipher is used with key as “KEY” and period as 5?(a) IND(b) USA(c) RSA(d) AUSThis question was posed to me in an online quiz.This question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» RIGHT answer is (b) USA Best explanation: The decryption in BIFID cipher BEGINS identically to encryption. Then we find the corresponding COORDINATES and then we GET the plain text. So the plain text is “USA”. |
|
| 57. |
What will be the ciphered text corresponding to “ALGORITHM” if bifid cipher is used for encryption with key as “KEY” with a period as 5?(a) SBPISZTKZH(b) PLNSOWGKQM(c) SELFQEXBHM(d) YFSGWNFBWThe question was posed to me during an online exam.Query is from Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct answer is (d) YFSGWNFBW |
|
| 58. |
What will be the ciphered text corresponding to “SANFOUNDRY” if bifid cipher is used for encryption with key as “KEY” with period as 5?(a) SBPISZTKZH(b) PLNSOWGKQM(c) SELFQEXBHM(d) YFSGWNFBWThis question was posed to me in an interview for internship.The doubt is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct choice is (b) PLNSOWGKQM |
|
| 59. |
Bifid square combines autokey square with transposition.(a) true(b) falseThe question was asked during an interview.Origin of the question is Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Right answer is (B) false |
|
| 60. |
Trifid cipher encrypts the plain text by using bifid cipher twice.(a) true(b) falseI got this question in unit test.This interesting question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» Correct choice is (b) false |
|
| 61. |
Bifid cipher combines transposition with which of the following cipher?(a) Polybius square cipher(b) Playfair cipher(c) gronsfeld cipher(d) trifid cipherThis question was posed to me in final exam.This is a very interesting question from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» CORRECT ANSWER is (a) Polybius square cipher The BEST explanation: Bifid cipher COMBINES polybius square cipher with transposition. It USES fractionation to obtain diffusion. |
|
| 62. |
Which of the following cipher uses polybius square?(a) bifid cipher(b) beaufort cipher(c) trithemius cipher(d) gronsfeld cipherThe question was asked by my school teacher while I was bunking the class.Enquiry is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct answer is (a) bifid cipher |
|
| 63. |
What is the period in bifid cipher?(a) length of blocks in which the plain text is divided before encryption(b) number of letters after which the key is repeated(c) number of blocks into which the plain text is divided before encryption(d) number of keys used for encryptionThe question was asked in an online interview.This is a very interesting question from Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The correct answer is (a) length of BLOCKS in which the plain text is divided before encryption |
|
| 64. |
What will be the plain text corresponding to cipher text “IWRWHS” if running key cipher is used with keyword as “SANFOUNDRY”?(a) SECRET(b) QWERTY(c) INDIAN(d) FRIENDI got this question during an online interview.Origin of the question is Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Right choice is (b) QWERTY |
|
| 65. |
What will be the ciphered text corresponding to “ALGORITHM” if running key cipher is used for encryption with keyword as “DATASTRUCTURE”?(a) LDJOZOBBK(b) DLZOJBKBO(c) ZOLDJBKBO(d) OLZBJDKBOI got this question in an online quiz.Origin of the question is Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» RIGHT choice is (b) DLZOJBKBO To explain: Encryption in RUNNING key cipher takes place exactly as in vigenere cipher if we don’t INCLUDE the indicator BLOCK. So by USING the tabula recta we can find the encrypted text which is “DLZOJBKBO”. |
|
| 66. |
What will be the ciphered text corresponding to “SANFOUNDRY” if running key cipher is used for encryption with keyword as “ONCEUPONATIME”?(a) GNPJIJBQRR(b) GNPIJJBRRQ(c) GPNJJOBQRR(d) GJJNPOBQRIThe question was asked in quiz.My query is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Right choice is (a) GNPJIJBQRR |
|
| 67. |
Running key cipher is a variation of?(a) vigenere cipher(b) autokey cipher(c) hill cipher(d) route cipherThis question was addressed to me in final exam.I'd like to ask this question from Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Correct answer is (a) vigenere CIPHER |
|
| 68. |
Running key cipher is a transposition cipher.(a) true(b) falseI had been asked this question during a job interview.The origin of the question is Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» Right option is (b) false |
|
| 69. |
What will be the plain text corresponding to cipher text “KEPWSN” if running key cipher is used with keyword as “SANFOUNDRY”?(a) SECRET(b) QWERTY(c) INDIAN(d) FRIENDI got this question in my homework.Enquiry is from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» The correct choice is (a) SECRET |
|
| 70. |
Running key cipher is harder to decipher than keyword cipher.(a) true(b) falseThe question was posed to me during an online exam.My doubt is from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» The correct option is (a) true |
|
| 71. |
Tabula recta consists of _______________(a) 26 rows and 26 columns(b) 26 rows and 1 column(c) 1 row and 26 columns(d) 27 rows and 27 columnsThis question was posed to me in a job interview.The doubt is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Right ANSWER is (a) 26 rows and 26 columns |
|
| 72. |
Which of the following is a difference between running key cipher and vigenere cipher?(a) they use different tables for encryption(b) vigenere cipher is poly alphabetic whereas running key cipher is mono alphabetic(c) in vigenere cipher the key is repeated whereas in running key cipher key is not repeated(d) vigenere cipher was used in ancient time whereas running key cipher is used in modern worldThe question was asked in examination.This intriguing question comes from Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» CORRECT choice is (c) in vigenere CIPHER the key is repeated whereas in RUNNING key cipher key is not repeated Easy explanation - In running key cipher key is not repeated UNLIKE vigenere cipher. They both use the same table for encryption. |
|
| 73. |
Which of the following cipher uses a key book or a key text instead of a keyword?(a) vigenere cipher(b) autokey cipher(c) running key cipher(d) affine cipherThe question was posed to me in final exam.The query is from Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The correct choice is (c) running key cipher |
|
| 74. |
Encryption in running key cipher is done using _______________(a) running key table(b) vigenere cycle(c) tabula recta(d) any table provided by the person performing the encryptionI have been asked this question in an online quiz.Question is taken from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct ANSWER is (c) tabula RECTA |
|
| 75. |
Running key cipher is an example of _______________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherThis question was posed to me by my college director while I was bunking the class.My enquiry is from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct choice is (b) poly-ALPHABETIC cipher |
|
| 76. |
What is the significance of indicator block in running key cipher?(a) it helps in encryption(b) it strengthens the cipher(c) it gives information regarding the book/text from where the key is taken(d) it makes encryption easyI have been asked this question by my college director while I was bunking the class.My question is taken from Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct choice is (c) it gives INFORMATION regarding the book/text from where the KEY is taken |
|
| 77. |
What will be the encrypted text corresponding to plain text “SAN” using standard polybius square cipher?(a) 431133(b) 341133(c) 441133(d) 114433This question was posed to me in an interview.My question is from Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The correct answer is (a) 431133 |
|
| 78. |
What will be the plain text corresponding to ciphered text “134325” if standard polybius square cipher is used for encryption?(a) SRH(b) CSK(c) RCB(d) KKRThis question was posed to me in an online quiz.I want to ask this question from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» The correct choice is (b) CSK |
|
| 79. |
Which of the following cipher uses polybius square cipher in its first step of encrypting data?(a) Autokey cipher(b) One time pad cipher(c) ADFGVX cipher(d) Rail fence cipherThe question was asked in an interview for internship.I want to ask this question from Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct answer is (c) ADFGVX cipher |
|
| 80. |
Polybius square cipher is less susceptible to frequency analysis.(a) true(b) falseI got this question in an interview for job.The query is from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» The correct OPTION is (b) false |
|
| 81. |
Auto key cipher is more secure than polybius square cipher?(a) true(b) falseThis question was addressed to me at a job interview.This intriguing question originated from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» The correct choice is (a) true |
|
| 82. |
Which two English letters are usually combined in polybius table?(a) A and B(b) Y and Z(c) I and J(d) J and KThis question was posed to me by my college director while I was bunking the class.This interesting question is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct option is (C) I and J |
|
| 83. |
Polybius square cipher is most closely related to?(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherThe question was asked in examination.My question is based upon Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The correct option is (a) MONO-alphabetic CIPHER |
|
| 84. |
What is the usual size of polybius square used for encrypting English alphabets?(a) 5 X 5(b) 6 X 6(c) 26 X 26(d) 25 X 25I have been asked this question during a job interview.This is a very interesting question from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct choice is (a) 5 X 5 |
|
| 85. |
Which of the following is made possible by the use of Polybius square?(a) To represent the plain text by smaller set of symbols(b) To represent the plain text by larger set of symbols(c) To represent the plain text by the letters of some other language(d) To represent the plain text by the same set of symbolsThe question was posed to me in a job interview.My question is based upon Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct ANSWER is (a) To represent the plain text by smaller set of symbols |
|
| 86. |
How many keys are required for encryption and decryption of data when we use asymmetric cipher?(a) 0(b) 1(c) 2(d) 3The question was asked during an internship interview.This interesting question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The correct option is (c) 2 |
|
| 87. |
Polybius square is also known by the name of?(a) Polybius checkboard(b) Polybius table(c) Ploybius board(d) Ploybius keypadI have been asked this question during an online exam.My query is from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» CORRECT option is (a) Polybius checkboard Explanation: Polybius SQUARE is similar to substitution cipher. It is also known by the NAME of Polybius checkboard. |
|
| 88. |
What will be the plain text corresponding to cipher text “RVUVMF” if trithemius cipher is used?(a) RABBIT(b) RUSSIA(c) RANGER(d) FRIENDI got this question by my college director while I was bunking the class.My question is taken from Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Correct answer is (b) RUSSIA |
|
| 89. |
What will be the ciphered text corresponding to “ALGORITHM” if trithemius cipher is used for encryption?(a) BNJSWOAPV(b) BMHPSJUIN(c) AMIRVNZOU(d) MBPHJSNIUI have been asked this question by my school principal while I was bunking the class.Question is taken from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» CORRECT option is (C) AMIRVNZOU For explanation: Encryption in trithemius cipher takes place exactly as in vigenere cipher if we CONSIDER the key to be ABCDEFGHIJKLMNOPQRSTUVWXYZ. So by using the tabula recta we can find the encrypted TEXT which is “AMIRVNZOU”. |
|
| 90. |
What will be the ciphered text corresponding to “SANFOUNDRY” if trithemius cipher is used for encryption?(a) SBPISZTKZH(b) TCQJTAULAI(c) TBOGPVOESZ(d) SPBISZKTZHThe question was asked in semester exam.This interesting question is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct answer is (a) SBPISZTKZH |
|
| 91. |
Which of the following cipher is easiest to crack?(a) vigenere cipher(b) running key cipher(c) trithemius cipher(d) all are equally secureI had been asked this question in examination.My question comes from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Right answer is (c) trithemius cipher |
|
| 92. |
Trithemius cipher is harder to crack than caesar cipher.(a) True(b) FalseI got this question in examination.I'd like to ask this question from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct CHOICE is (a) True |
|
| 93. |
What will be the plain text corresponding to cipher text “ACCFYX” if trithemius cipher is used?(a) ABACUS(b) ABROAD(c) ABRUPT(d) ABUSEDI had been asked this question during an interview.Enquiry is from Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT answer is (a) ABACUS |
|
| 94. |
Trithemius cipher is harder to crack than vigenere cipher.(a) true(b) falseThe question was posed to me in examination.This question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» Right OPTION is (b) false |
|
| 95. |
Trithemius cipher is a special case of _______________(a) autokey cipher(b) vigenere cipher(c) hill cipher(d) route cipherThis question was addressed to me in an internship interview.My question is from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (b) vigenere cipher |
|
| 96. |
Which of the following cipher require the use of tabula recta?(a) hill cipher(b) route cipher(c) rail fence cipher(d) trithemius cipherI got this question in my homework.This interesting question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» The correct answer is (d) trithemius cipher |
|
| 97. |
Which of the following is a difference between trithemius cipher and vigenere cipher?(a) they use different tables for encryption(b) vigenere cipher is poly alphabetic whereas running key cipher is mono alphabetic(c) vigenere cipher uses a key whereas no key is required for using trithemius cipher(d) vigenere cipher is substitution cipher whereas trithemius cipher is transposition cipherThe question was asked during an interview.Enquiry is from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» RIGHT option is (C) vigenere cipher USES a key WHEREAS no key is required for using trithemius cipher Best explanation: Trithemius cipher is a special case of vigenere cipher. The difference is that vigenere cipher uses a different key every TIME but a fixed key is used by trithemius cipher. |
|
| 98. |
Which of the following is a modified version of Caesar cipher?(a) vigenere cipher(b) autokey cipher(c) running key cipher(d) trithemius cipherI got this question by my college director while I was bunking the class.I need to ask this question from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct ANSWER is (d) TRITHEMIUS cipher |
|
| 99. |
Encryption in trithemius cipher is done using _______________(a) trithemius table(b) vigenere cycle(c) tabula recta(d) any table provided by the person performing the encryptionThe question was asked in an interview for internship.Asked question is from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct answer is (C) tabula recta |
|
| 100. |
Trithemius cipher is an example of ________________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherI have been asked this question in homework.Enquiry is from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» The correct option is (B) POLY-alphabetic cipher |
|