InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
What will be the plain text corresponding to cipher text “ZEYQC” if autokey cipher is used with keyword as “SANFOUNDRY”?(a) INDIA(b) WORLD(c) HELLO(d) SECRETI have been asked this question by my school teacher while I was bunking the class.The above asked question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Correct OPTION is (c) HELLO |
|
| 152. |
Autokey cipher is harder to crack than keyword cipher.(a) true(b) falseThe question was posed to me in homework.This key question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Correct choice is (a) true |
|
| 153. |
Autokey cipher is closely related to ___________(a) Vigenere cipher(b) Hill cipher(c) Play fair cipher(d) Rotor cipherThis question was addressed to me in unit test.This intriguing question comes from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Correct OPTION is (a) Vigenere CIPHER |
|
| 154. |
Which of the following is not a type of poly alphabetic cipher?(a) Autokey cipher(b) Hill cipher(c) One time pad cipher(d) Additive cipherThis question was addressed to me during an interview for a job.Enquiry is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT answer is (d) Additive cipher |
|
| 155. |
Which of the following correctly defines poly alphabetic cipher?(a) a substitution based cipher which uses multiple substitution at different positions(b) a substitution based cipher which uses fixed substitution over entire message(c) a transposition based cipher which uses multiple substitution at different positions(d) a transposition based cipher which uses fixed substitution over entire messageThe question was posed to me in semester exam.Question is taken from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» RIGHT choice is (a) a SUBSTITUTION based cipher which uses multiple substitution at different positions Best EXPLANATION: Poly ALPHABETIC cipher is a type of substitution cipher. It uses multiple substitution at different positions in ORDER to cipher the plain text. |
|
| 156. |
Encryption in Autokey cipher is done using ___________(a) vigenere formula(b) vigenere cycle(c) vigenere table(d) vigenere additionThe question was posed to me in exam.I'd like to ask this question from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT answer is (C) vigenere table |
|
| 157. |
Autokey cipher is an example of ___________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherThis question was addressed to me during an interview.My enquiry is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The correct option is (b) POLY-ALPHABETIC cipher |
|
| 158. |
What is the meaning of cipher in cryptography?(a) an algorithm that performs encryption(b) an algorithm that generates a secret code(c) an algorithm that performs encryption or decryption(d) a secret codeI had been asked this question in homework.This question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (c) an algorithm that performs encryption or decryption |
|
| 159. |
What will be the ciphered text corresponding to “ALGORITHM” if beaufort cipher is used for encryption with key as “KEY”?(a) BNJSWOAPV(b) KTSWNQRXM(c) AMIRVNZOU(d) MBPHJSNIUThe question was asked in unit test.This key question is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Correct choice is (b) KTSWNQRXM |
|
| 160. |
What will be the ciphered text corresponding to “SANFOUNDRY” if beaufort cipher is used for encryption with key as “KEY”?(a) SBPISZTKZH(b) TCQJTAULAI(c) SELFQEXBHM(d) SPBISZKTZHThis question was addressed to me in an interview for internship.Question is from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT answer is (c) SELFQEXBHM |
|
| 161. |
Beaufort cipher and variant beaufort cipher are same ciphers.(a) True(b) FalseI had been asked this question by my school principal while I was bunking the class.I would like to ask this question from Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The correct CHOICE is (B) False |
|
| 162. |
What will be the plain text corresponding to cipher text “SEDGKG” if beaufort cipher is used with key as “KEY”?(a) PRISON(b) DEATHS(c) SAVEUS(d) ABUSEDThis question was addressed to me in an online interview.I want to ask this question from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Right choice is (C) SAVEUS |
|
| 163. |
The process of decryption is exactly same as that of encryption in beaufort cipher.(a) True(b) FalseThe question was posed to me in an interview for job.Question is taken from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Correct OPTION is (a) True |
|
| 164. |
Beaufort cipher is a variant of ____________(a) autokey cipher(b) vigenere cipher(c) hill cipher(d) route cipherI got this question by my college director while I was bunking the class.My question is from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» Correct CHOICE is (b) vigenere cipher |
|
| 165. |
Which of the following is a difference between beaufort cipher and vigenere cipher?(a) they use different tables for encryption(b) vigenere cipher is poly alphabetic whereas beaufort cipher is mono alphabetic(c) vigenere cipher uses a key whereas no key is required for using beaufort cipher(d) they use the same table for encryption, but in a different mannerThe question was asked in a national level competition.My doubt is from Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The correct OPTION is (d) they USE the same table for ENCRYPTION, but in a DIFFERENT manner |
|
| 166. |
Which of the following is reciprocal cipher?(a) vigenere cipher(b) autokey cipher(c) running key cipher(d) beaufort cipherThis question was posed to me in an internship interview.My doubt is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» CORRECT choice is (d) beaufort cipher Explanation: A reciprocal cipher is a cipher in which if we try to ENCRYPT the cipher text (using the same cipher) then we GETS the plain text as a RESULT. In other words, the process of decryption and encryption is exactly the same. |
|
| 167. |
Encryption in beaufort cipher is done using ____________(a) trithemius table(b) vigenere cycle(c) tabula recta(d) four square tableI had been asked this question during an internship interview.I need to ask this question from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Right answer is (c) TABULA recta |
|
| 168. |
Beaufort cipher is an example of ____________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherI have been asked this question in an interview for job.This interesting question is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Right ANSWER is (B) poly-alphabetic cipher |
|
| 169. |
What will be the plain text corresponding to cipher text “SCEFJV” if gronsfeld cipher is used with key “1234”?(a) RABBIT(b) RUSSIA(c) RANGER(d) FRIENDThis question was addressed to me during a job interview.The question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» Correct choice is (a) RABBIT |
|
| 170. |
What will be the ciphered text corresponding to “ALGORITHM” if gronsfeld cipher is used for encryption with key “4321”?(a) BNJSSKWLN(b) EOIPVLVIQ(c) BNJSRITHM(d) EOIPRITHMThis question was posed to me in my homework.This interesting question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Correct OPTION is (b) EOIPVLVIQ |
|
| 171. |
What will be the ciphered text corresponding to “SANFOUNDRY” if gronsfeld cipher is used for encryption with key as “1234”?(a) TCQJPWQHSA(b) TCQJTAULAI(c) TCQJOUNDRY(d) UETNQYTLTCThis question was addressed to me by my college professor while I was bunking the class.The origin of the question is Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT CHOICE is (a) TCQJPWQHSA |
|
| 172. |
Which of the following is not a transposition cipher?(a) rail fence cipher(b) gronsfeld cipher(c) hill cipher(d) route cipherI had been asked this question by my college director while I was bunking the class.The question is from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» CORRECT option is (b) gronsfeld cipher The BEST I can explain: Rail fence, HILL and route cipher are examples of transposition cipher. Gronsfeld cipher is a SUBSTITUTION cipher and so is the correct option. |
|
| 173. |
Gronsfeld cipher is a substitution cipher.(a) True(b) FalseI have been asked this question in final exam.Question is taken from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» RIGHT answer is (a) True To explain: GRONSFELD cipher is a type of substitution cipher. It is a variation of VIGENERE cipher. |
|
| 174. |
What will be the plain text corresponding to cipher text “EETPEG” if gronsfeld cipher is used with key “4321”?(a) ABACUS(b) ABROAD(c) ABRUPT(d) ABUSEDThe question was posed to me in a job interview.I'd like to ask this question from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The correct choice is (b) ABROAD |
|
| 175. |
Gronsfeld cipher is harder to crack than caesar cipher.(a) True(b) FalseI have been asked this question in a national level competition.I'd like to ask this question from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Right choice is (a) True |
|
| 176. |
Gronsfeld cipher is a variation of ____________(a) autokey cipher(b) vigenere cipher(c) hill cipher(d) route cipherThis question was posed to me by my school principal while I was bunking the class.This question is from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» The correct option is (b) vigenere cipher |
|
| 177. |
Which of the following cipher does not require the use of tabula recta?(a) running key cipher(b) vigenere cipher(c) gronsfeld cipher(d) trithemius cipherThis question was addressed to me during an interview for a job.My enquiry is from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» Right ANSWER is (c) gronsfeld CIPHER |
|
| 178. |
Which of the following cipher uses a numeric key?(a) gronsfeld cipher(b) vigenere cipher(c) trithemius cipher(d) running key cipherI got this question during a job interview.This interesting question is from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» Right option is (a) GRONSFELD cipher |
|
| 179. |
Gronsfeld cipher is similar to?(a) additive cipher(b) multiplicative cipher(c) caesar cipher(d) affine cipherThe question was posed to me in examination.My question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» Correct answer is (c) caesar CIPHER |
|
| 180. |
Which of the following is true about encryption in gronsfeld cipher?(a) It replaces letters with numbers(b) It shifts the letters of plain text on the basis of key value(c) It makes substitutions by using tabula recta(d) It makes substitutions on the basis of a mathematical formulaI have been asked this question in final exam.I would like to ask this question from Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct answer is (b) It SHIFTS the letters of plain text on the basis of KEY value |
|
| 181. |
Gronsfeld cipher is an example of _____________(a) mono-alphabetic cipher(b) poly-alphabetic cipher(c) transposition cipher(d) additive cipherI have been asked this question in my homework.The query is from Cryptography in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Correct choice is (b) POLY-ALPHABETIC cipher |
|
| 182. |
Which of the following is not true about atbash cipher?(a) it is a mono alphabetic substitution cipher(b) it can only be used to encrypt hebrew alphabet(c) it is a special case of affine cipher(d) it is weaker than playfair cipherI had been asked this question in examination.This interesting question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT option is (b) it can only be used to encrypt hebrew alphabet |
|
| 183. |
What will be the plain text corresponding to ciphered text “MAO” if atbash cipher is used for encryption?(a) NZL(b) IND(c) AUS(d) ENGThe question was posed to me in quiz.This intriguing question comes from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» The correct choice is (a) NZL |
|
| 184. |
What will be the ciphered text corresponding to plain text “SECRET” if atbash cipher is used for encryption?(a) VHIXVG(b) HVXIVG(c) HXVIVG(d) VIHXIVI have been asked this question in an international level competition.This intriguing question originated from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Correct choice is (B) HVXIVG |
|
| 185. |
Atbash cipher cannot be cracked until the exact type of encryption of ciphered text is known.(a) True(b) FalseThis question was posed to me in examination.My question is based upon Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct answer is (b) False |
|
| 186. |
Atbash cipher is an example of?(a) Mono alphabetic substitution cipher(b) Transposition cipher(c) Poly alphabetic substitution cipher(d) Geometric substitution cipherThis question was posed to me in an interview.This question is from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» RIGHT option is (a) Mono alphabetic substitution cipher Easiest explanation - Atbash cipher is an example of mono alphabetic substitution cipher. It REPLACES each ALPHABET of the plain TEXT with a corresponding letter which we can see in the table below. |
|
| 187. |
Atbash cipher is less secure than affine cipher.(a) True(b) FalseThis question was addressed to me by my college director while I was bunking the class.I'm obligated to ask this question of Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct answer is (a) True |
|
| 188. |
Which of the following is a mono alphabetic substitution cipher?(a) vigenere cipher(b) one time pad cipher(c) play fair cipher(d) atbash cipherThis question was posed to me in an international level competition.My question is from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» The correct choice is (d) atbash cipher |
|
| 189. |
Choose the weakest cipher from the following?(a) vigenere cipher(b) rail fence cipher(c) hill cipher(d) atbash cipherThe question was posed to me during an internship interview.I want to ask this question from Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (d) atbash cipher |
|
| 190. |
Which of the following cipher is a special case of affine cipher?(a) Vigenere cipher(b) Autokey cipher(c) Atbash cipher(d) Hill cipherI have been asked this question in an international level competition.My question is based upon Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» CORRECT option is (c) Atbash cipher Easiest explanation - Atbash cipher is a SPECIAL case of affine cipher. We have to ASSUME a=b=25 as the KEY in affine cipher to get the same ENCRYPTION. |
|
| 191. |
Atbash cipher was originally used for encrypting _____________(a) english alphabet(b) greek alphabet(c) hebrew alphabet(d) hindi alphabetThe question was posed to me in an online quiz.The above asked question is from Cryptography topic in section Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (C) hebrew alphabet |
|
| 192. |
Which of the following cipher does not require a key for encrypting plain text?(a) atbash cipher(b) affine cipher(c) playfair cipher(d) vigenere cipherI had been asked this question during an interview.My question is based upon Cryptography topic in chapter Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT answer is (a) atbash cipher |
|
| 193. |
What will be the ciphered text if the string “SANFOUNDRY” is given as input to the code of vigenere cipher with keyword as “HELLO”?(a) UEWIIDKLL(b) ZEYQCOCM(c) ZEYQCBROCM(d) ZEYQCBROCMJDHThis question was posed to me in an online quiz.This intriguing question originated from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (c) ZEYQCBROCM |
|
| 194. |
In which of the following cipher the plain text and the ciphered text does not have a same number of letters?(a) affine cipher(b) vigenere cipher(c) columnar cipher(d) additive cipherThe question was asked by my school teacher while I was bunking the class.Query is from Cryptography topic in division Cryptography of Data Structures & Algorithms II |
|
Answer» Right choice is (b) vigenere CIPHER |
|
| 195. |
What will be the plain text corresponding to cipher text “PROTO” if vigenere cipher is used with keyword as “HELLO”?(a) SANFOUNDRY(b) WORLD(c) INDIA(d) AMERICAThe question was asked by my college director while I was bunking the class.My doubt is from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» The CORRECT option is (c) INDIA |
|
| 196. |
Vigenere cipher is harder to decipher than keyword cipher.(a) true(b) falseI had been asked this question in an online interview.This is a very interesting question from Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» Right option is (a) true |
|
| 197. |
Vigenere table consists of _________(a) 26 rows and 26 columns(b) 26 rows and 1 column(c) 1 row and 26 columns(d) 27 rows and 27 columnsThe question was posed to me by my school teacher while I was bunking the class.My question is based upon Cryptography in division Cryptography of Data Structures & Algorithms II |
|
Answer» Right option is (a) 26 rows and 26 COLUMNS |
|
| 198. |
Which of the following is not a type of poly alphabetic cipher?(a) Rotor cipher(b) Hill cipher(c) One time pad cipher(d) Multiplicative cipherThe question was asked during an interview.This is a very interesting question from Cryptography in portion Cryptography of Data Structures & Algorithms II |
|
Answer» The correct CHOICE is (d) Multiplicative cipher |
|
| 199. |
Which of the following correctly defines poly alphabetic cipher?(a) a substitution based cipher which uses multiple substitution at different positions(b) a substitution based cipher which uses fixed substitution over entire message(c) a transposition based cipher which uses multiple substitution at different positions(d) a transposition based cipher which uses fixed substitution over entire messageI have been asked this question during a job interview.Asked question is from Cryptography topic in portion Cryptography of Data Structures & Algorithms II |
|
Answer» Right answer is (a) a substitution BASED cipher which uses multiple substitution at DIFFERENT positions |
|
| 200. |
Encryption in Vigenere cipher is done using _________(a) vigenere formula(b) vigenere cycle(c) vigenere square(d) vigenere additionThe question was asked in homework.The query is from Cryptography in section Cryptography of Data Structures & Algorithms II |
|
Answer» Correct option is (c) vigenere SQUARE |
|