MCQ 1 In an asymmetric key cipher, both the receivers uses _____________.
MCQ 2 Which of the following is not an example of presentation layer issues?
MCQ 3 Using the following values of a character M = 5, p = 3, q = 11 & d = 7, Find the the value of cipher text C by RSA Algorithm.
MCQ 4 A cryptosystem is also termed as ______________.
MCQ 5 A _______________ network is used inside an organisation.
MCQ 6 Encryption and Decryption is the responsibility of __________________ Layer.
MCQ 7 The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and _________________.
MCQ 8 ________________ is a cipher formed out of substitution where for a given key-value the cipher alphabet for every plain text remains fixed all through the encryption procedure.
MCQ 9 Cryptographic algorithms are based on mathematical algorithms where these algorithms use _____________ for a secure transformation of data.
MCQ 10 _______________ is the art & science of cracking the cipher-text without knowing the key.
MCQ 11 _______________ provide security at the transport layer.
MCQ 12 Which 2 protocols are used in the Transport layer of the TCP/IP model?
MCQ 13 An _____________ is a network that allows and authorised access from outside users of the whole world.
MCQ 14 Which of the following is not a vulnerability of the application layer?
MCQ 15 Data Encryption Standard is an example of a _____________ cryptosystem.
MCQ 16 In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information.
MCQ 17 What is the port number of http.
MCQ 18 In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.
MCQ 19 Encryption-decryption in cryptosystem is done in ___________________ ways.
MCQ 20 __________________ cryptography has always been focussing on the concept of ‘security through obscurity’.
MCQ 21 When plain text is converted to unreadable format, it is termed as _____________.
MCQ 22 A type of cipher that uses multiple alphabetic strings.
MCQ 23 Which of the protocol is not susceptible to sniffing?
MCQ 24 _____________ are programs or devices that capture the vital information from the target network or particular network.
MCQ 25 An ______________________ along with a key is used in the encryption and decryption of data.,