InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
What is the Discrete logarithm to the base 15 (mod 19) for a =9?(a) 3(b) 7(c) 12(d) 4The question was posed to me in an internship interview.I need to ask this question from Number Theory in chapter More Number Theory of Cryptograph & Network Security |
|
Answer» The CORRECT ANSWER is (d) 4 |
|
| 52. |
3^201 mod 11 =(a) 3(b) 5(c) 6(d) 10I got this question during an online exam.Question is from Number Theory in portion More Number Theory of Cryptograph & Network Security |
|
Answer» The correct CHOICE is (a) 3 |
|
| 53. |
ᶲ(37)=(a) 24(b) 22(c) 13(d) 36I had been asked this question in a job interview.My question comes from Number Theory topic in section More Number Theory of Cryptograph & Network Security |
|
Answer» Correct option is (d) 36 |
|
| 54. |
What is the period of 17 (mod 19)(a) 5(b) 7(c) 9(d) 11The question was asked in an online quiz.My doubt is from Number Theory topic in chapter More Number Theory of Cryptograph & Network Security |
| Answer» | |
| 55. |
The inverse of 49 mod 37 is –(a) 31(b) 23(c) 22(d) 34I have been asked this question in a job interview.Asked question is from Number Theory topic in portion More Number Theory of Cryptograph & Network Security |
|
Answer» Correct OPTION is (d) 34 |
|
| 56. |
Find the primitive roots of G=?.(a) {2, 6, 8}(b) {2, 5, 8}(c) {3, 4, 7, 8}(d) {2, 6, 7, 8}I have been asked this question in quiz.The origin of the question is Number Theory in chapter More Number Theory of Cryptograph & Network Security |
|
Answer» The correct CHOICE is (d) {2, 6, 7, 8} |
|
| 57. |
Find the primitive roots of G=?.(a) {2, 6, 8}(b) {2, 5, 8}(c) {3, 4, 7, 8}(d) {2, 6, 7, 8}This question was posed to me during an online interview.My question comes from Number Theory in portion More Number Theory of Cryptograph & Network Security |
| Answer» | |
| 58. |
If we use exponentiation to encrypt/decrypt, the adversary can use logarithm to attack and this method is very efficient.(a) True(b) FalseThis question was addressed to me in semester exam.I'd like to ask this question from Number Theory in portion More Number Theory of Cryptograph & Network Security |
|
Answer» The CORRECT option is (b) False |
|
| 59. |
Equations have either no solution or exactly three incongruent solutions(a) True(b) FalseI have been asked this question in unit test.My question is taken from Number Theory topic in division More Number Theory of Cryptograph & Network Security |
|
Answer» The CORRECT choice is (b) False |
|