InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
DSA protocol is based on(a) Discrete logarithm problem(b) Continuous logarithm problem(c) Discrete & Continuous logarithm problem(d) None of the mentionedI had been asked this question in an internship interview.I want to ask this question from Pretty Good Privacy topic in section Encryption and Decryption of Digital Communications |
|
Answer» Correct option is (a) Discrete LOGARITHM problem |
|
| 2. |
The hash function(a) Is collision free(b) Has manageable collision(c) Has high unmanageable level of collision(d) None of the mentionedThis question was addressed to me by my college professor while I was bunking the class.Query is from Pretty Good Privacy topic in section Encryption and Decryption of Digital Communications |
|
Answer» CORRECT answer is (a) Is COLLISION FREE Explanation: Hash function is collision free and it is UNFEASIBLE that two different messages will create the same hash value. |
|
| 3. |
In hash function output length is fixed.(a) True(b) FalseThis question was posed to me in an internship interview.My query is from Pretty Good Privacy topic in section Encryption and Decryption of Digital Communications |
|
Answer» Correct choice is (a) True |
|
| 4. |
The digital signature provides authentication to the(a) Sender(b) Message(c) Sender & Message(d) None of the mentionedI had been asked this question in homework.I want to ask this question from Pretty Good Privacy topic in chapter Encryption and Decryption of Digital Communications |
|
Answer» Correct answer is (c) Sender & MESSAGE |
|
| 5. |
Which should be used first to decrypt?(a) Public key(b) Private key(c) Public & Private key(d) None of the mentionedThis question was addressed to me in an interview.This interesting question is from Pretty Good Privacy in portion Encryption and Decryption of Digital Communications |
|
Answer» Correct OPTION is (b) Private key |
|
| 6. |
Which algorithm is used for public key encryption?(a) RSA(b) Diffie-Hellman(c) RSA & Diffie-Hellman(d) None of the mentionedThe question was posed to me in semester exam.Question is taken from Pretty Good Privacy in chapter Encryption and Decryption of Digital Communications |
|
Answer» The CORRECT ANSWER is (C) RSA & Diffie-Hellman |
|
| 7. |
What is the key size allowed in PGP?(a) 1024-1056(b) 1024-4056(c) 1024-4096(d) 1024-2048I got this question by my school principal while I was bunking the class.This question is from Pretty Good Privacy in chapter Encryption and Decryption of Digital Communications |
|
Answer» Correct answer is (C) 1024-4096 |
|
| 8. |
Which operation is used in encryption using IDEA?(a) Addition modulo 216(b) Bit wise XOR(c) Addition modulo 216 & Bit wise XOR(d) None of the mentionedThe question was posed to me in an online interview.This intriguing question comes from Pretty Good Privacy in division Encryption and Decryption of Digital Communications |
|
Answer» The correct choice is (C) Addition modulo 216 & Bit wise XOR |
|
| 9. |
The key size of DES is(a) 56 bits(b) 64 bits(c) 128 bits(d) 168 bitsI have been asked this question in a national level competition.This key question is from Pretty Good Privacy topic in section Encryption and Decryption of Digital Communications |
|
Answer» Right answer is (a) 56 bits |
|
| 10. |
These three ciphers can operate of ______ of plaintext and cipher text.(a) 128 bit blocks(b) 64 bit blocks(c) 256 bit blocks(d) 156 bit blocksThe question was asked in an interview.I'd like to ask this question from Pretty Good Privacy topic in chapter Encryption and Decryption of Digital Communications |
|
Answer» Correct CHOICE is (b) 64 bit BLOCKS |
|
| 11. |
Which block cipher has key length of 128 bits?(a) IDEA(b) CAST(c) IDEA & CAST(d) None of the mentionedThe question was asked during an internship interview.My question comes from Pretty Good Privacy in section Encryption and Decryption of Digital Communications |
|
Answer» Correct choice is (c) IDEA & CAST |
|
| 12. |
PGP offers _____ block ciphers for message encryption.(a) Triple-DES(b) CAST(c) IDEA(d) All of the mentionedThis question was posed to me in an interview for internship.My question comes from Pretty Good Privacy in division Encryption and Decryption of Digital Communications |
|
Answer» Correct option is (d) All of the mentioned |
|
| 13. |
For digital signatures private key cryptosystem is used.(a) True(b) FalseI have been asked this question during a job interview.This intriguing question comes from Pretty Good Privacy in chapter Encryption and Decryption of Digital Communications |
|
Answer» CORRECT CHOICE is (b) False To elaborate: Public key CRYPTOSYSTEM is used for the CREATION of digital SIGNATURES. |
|
| 14. |
Data compression includes(a) Removal of redundant character(b) Uniform distribution of characters(c) Removal of redundant character & Uniform distribution of characters(d) None of the mentionedThis question was posed to me during an internship interview.I want to ask this question from Pretty Good Privacy topic in division Encryption and Decryption of Digital Communications |
|
Answer» Correct choice is (c) Removal of REDUNDANT CHARACTER & Uniform distribution of CHARACTERS |
|
| 15. |
Public key cryptosystem is used for the encryption of(a) Messages(b) Session key(c) Session key & Messages(d) None of the mentionedI had been asked this question during an interview for a job.I would like to ask this question from Pretty Good Privacy in portion Encryption and Decryption of Digital Communications |
|
Answer» The CORRECT CHOICE is (b) Session key |
|
| 16. |
Pretty good privacy (PGP) security system uses(a) Public key cryptosystem(b) Private key cryptosystem(c) Public & Private key cryptosystem(d) None of the mentionedThis question was addressed to me during an interview.The above asked question is from Pretty Good Privacy in chapter Encryption and Decryption of Digital Communications |
|
Answer» The correct choice is (c) PUBLIC & Private key cryptosystem |
|
| 17. |
Euler’s totient function is determined by(a) pq(b) (p-1)(q-1)(c) (p+1)(q+1)(d) p/qI had been asked this question in semester exam.This is a very interesting question from Public Key Cryptosystems in section Encryption and Decryption of Digital Communications |
|
Answer» CORRECT choice is (b) (P-1)(Q-1) Explanation: The Euler’s totient FUNCTION is determined by (p-1)(q-1), where p and q are kept hidden. |
|
| 18. |
Which should be kept as a secret in public key cryptosystem?(a) Encryption key(b) Decryption key(c) Encryption & Decryption key(d) None of the mentionedThe question was asked in an internship interview.The doubt is from Public Key Cryptosystems topic in division Encryption and Decryption of Digital Communications |
|
Answer» Correct choice is (b) DECRYPTION key |
|
| 19. |
Public key cryptosystem is also known as(a) One way function(b) Two way function(c) Feedback function(d) None of the mentionedI had been asked this question in examination.My question is based upon Public Key Cryptosystems topic in portion Encryption and Decryption of Digital Communications |
|
Answer» RIGHT choice is (a) ONE way function For explanation: PUBLIC key cryptosystem is called as a TRAP DOOR one way function. |
|
| 20. |
Public key cryptosystem uses same key for both encryption and decryption.(a) True(b) FalseI had been asked this question in an interview for job.Question is taken from Public Key Cryptosystems in division Encryption and Decryption of Digital Communications |
|
Answer» The correct choice is (b) False |
|
| 21. |
Synchronous ciphers uses(a) Confusion(b) Diffusion(c) Confusion & Diffusion(d) None of the mentionedThis question was posed to me in an international level competition.I would like to ask this question from Public Key Cryptosystems topic in division Encryption and Decryption of Digital Communications |
| Answer» | |
| 22. |
In which method, key-stream is generated independently?(a) Synchronous(b) Self synchronous(c) Synchronous & Self synchronous(d) None of the mentionedI got this question during an internship interview.The query is from Public Key Cryptosystems in section Encryption and Decryption of Digital Communications |
|
Answer» Right ANSWER is (a) SYNCHRONOUS |
|
| 23. |
In stream encryption, the key sequence repeats itself.(a) True(b) FalseThe question was asked during an interview.This intriguing question originated from Public Key Cryptosystems in division Encryption and Decryption of Digital Communications |
|
Answer» Right OPTION is (b) False |
|
| 24. |
In cipher feedback method, encryption is done on(a) Single individual bits(b) Characters(c) Single individual bits & Characters(d) None of the mentionedI have been asked this question in homework.This interesting question is from Public Key Cryptosystems in division Encryption and Decryption of Digital Communications |
|
Answer» The CORRECT answer is (a) SINGLE individual bits |
|
| 25. |
The substitution of the letters are done(a) Serially(b) Parallel way(c) Serially & Parallel way(d) None of the mentionedThis question was addressed to me in unit test.I would like to ask this question from Public Key Cryptosystems in portion Encryption and Decryption of Digital Communications |
|
Answer» RIGHT answer is (B) Parallel way Explanation: The substitution PART of the encryption scheme is performed in parallel on SMALL SEGMENT of the blocks. |
|
| 26. |
Cipher system can be solved effectively by statistically using(a) Time of occurrence(b) Frequency of occurrence(c) Length of the message(d) None of the mentionedThis question was addressed to me during an online exam.I want to ask this question from Public Key Cryptosystems topic in chapter Encryption and Decryption of Digital Communications |
|
Answer» Right answer is (b) Frequency of occurrence |
|
| 27. |
In transposition, the plaintext letters are(a) Substituted(b) Rearranged(c) Removed(d) None of the mentionedThe question was asked in an international level competition.This intriguing question originated from Public Key Cryptosystems in division Encryption and Decryption of Digital Communications |
|
Answer» Correct choice is (B) Rearranged |
|
| 28. |
For n input bits the number of substitution patterns are(a) 2n(b) (2n)!(c) 1/2n!(d) 2n!I have been asked this question in an interview for internship.Query is from Public Key Cryptosystems topic in chapter Encryption and Decryption of Digital Communications |
| Answer» | |
| 29. |
Encryption transformations are known as(a) Diffusion(b) Confusion(c) Diffusion & Confusion(d) None of the mentionedThis question was posed to me by my school teacher while I was bunking the class.This intriguing question comes from Public Key Cryptosystems in portion Encryption and Decryption of Digital Communications |
|
Answer» The correct ANSWER is (c) DIFFUSION & Confusion |
|
| 30. |
In this Merkle Hellman method same key is used for encryption and decryption.(a) True(b) FalseThis question was addressed to me during an online interview.Enquiry is from Public Key Cryptosystems in portion Encryption and Decryption of Digital Communications |
|
Answer» Right answer is (b) False |
|
| 31. |
Knapsack problem can be solved by(a) Public key cryptosystem(b) Private key cryptosystem(c) Public & Private key cryptosystem(d) None of the mentionedThe question was posed to me in my homework.My question is from Public Key Cryptosystems topic in section Encryption and Decryption of Digital Communications |
|
Answer» The CORRECT answer is (a) Public key cryptosystem |
|
| 32. |
Merkle hellman is a symmetric cryptosystem.(a) True(b) FalseThe question was posed to me in examination.The origin of the question is Public Key Cryptosystems topic in division Encryption and Decryption of Digital Communications |
|
Answer» Right answer is (B) False |
|
| 33. |
A set of numbers is called as super increasing if(a) Each element is greater than previous element(b) Each element greater than sum of all the previous elements(c) Each element greater than the average of all elements(d) Each element lesser than the sum of all the elementsI had been asked this question in exam.My question is taken from Public Key Cryptosystems topic in chapter Encryption and Decryption of Digital Communications |
|
Answer» The CORRECT option is (b) Each ELEMENT greater than SUM of all the previous elements |
|
| 34. |
A cryptographic hash function has variable output length.(a) True(b) FalseThe question was asked at a job interview.This interesting question is from Public Key Cryptosystems in portion Encryption and Decryption of Digital Communications |
|
Answer» Right choice is (b) False |
|
| 35. |
Examples of hash functions are(a) MD5(b) SHA-1(c) MD5 & SHA-1(d) None of the mentionedThe question was posed to me in an international level competition.This interesting question is from Public Key Cryptosystems topic in chapter Encryption and Decryption of Digital Communications |
|
Answer» RIGHT option is (C) MD5 & SHA-1 For explanation: Some EXAMPLES of hash functions are MD5 and SHA-1. |
|
| 36. |
Which has a key length of 128 bits?(a) IDEA(b) Triple-DES(c) IDEA & Triple-DES(d) None of the mentionedI have been asked this question in examination.Asked question is from Public Key Cryptosystems topic in division Encryption and Decryption of Digital Communications |
|
Answer» The correct ANSWER is (a) IDEA |
|
| 37. |
Which algorithm can be used to sign a message?(a) Public key algorithm(b) Private key algorithm(c) Public & Private key algorithm(d) None of the mentionedThis question was addressed to me in an internship interview.I'd like to ask this question from Public Key Cryptosystems in chapter Encryption and Decryption of Digital Communications |
|
Answer» The CORRECT choice is (a) Public key algorithm |
|
| 38. |
Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption.(a) Messages, session key(b) Session key, messages(c) Can be used for both(d) None of the mentionedThis question was addressed to me in my homework.Asked question is from Public Key Cryptosystems in division Encryption and Decryption of Digital Communications |
|
Answer» Correct OPTION is (a) MESSAGES, session key |
|
| 39. |
Which are called the block ciphers?(a) IDEA(b) CAST(c) Triple-DES(d) All of the mentionedI had been asked this question in a job interview.The above asked question is from Public Key Cryptosystems in section Encryption and Decryption of Digital Communications |
|
Answer» Right ANSWER is (d) All of the mentioned |
|
| 40. |
PGP system uses(a) Private key system(b) Public key system(c) Private & Public key system(d) None of the mentionedThe question was posed to me during an interview.I'm obligated to ask this question of Public Key Cryptosystems in chapter Encryption and Decryption of Digital Communications |
|
Answer» The correct ANSWER is (c) Private & Public key system |
|
| 41. |
In public key cryptosystem which is kept as public?(a) Encryption keys(b) Decryption keys(c) Encryption & Decryption keys(d) None of the mentionedI got this question at a job interview.This interesting question is from Public Key Cryptosystems topic in division Encryption and Decryption of Digital Communications |
|
Answer» RIGHT option is (a) ENCRYPTION keys To explain: In public KEY cryptosystem, the encryption keys are kept as public where as decryption keys are kept as SECRET. |
|
| 42. |
Pretty good privacy program is used for(a) Electronic mails(b) File encryption(c) Electronic mails & File encryption(d) None of the mentionedI have been asked this question in an online interview.I want to ask this question from Public Key Cryptosystems in chapter Encryption and Decryption of Digital Communications |
|
Answer» Correct answer is (c) Electronic MAILS & File encryption |
|
| 43. |
In a trapdoor function, the functions are easy to go in(a) One direction(b) Two directions(c) All directions(d) None of the mentionedThis question was addressed to me during an online interview.My doubt stems from Public Key Cryptosystems topic in chapter Encryption and Decryption of Digital Communications |
|
Answer» The correct ANSWER is (a) ONE direction |
|
| 44. |
In public key cryptosystem _____ keys are used for encryption and decryption.(a) Same(b) Different(c) Encryption Keys(d) None of the mentionedThe question was posed to me during an interview for a job.Asked question is from Public Key Cryptosystems topic in division Encryption and Decryption of Digital Communications |
|
Answer» Right OPTION is (b) Different |
|