MCQ 1 The original message, before being transformed, is

Correct Answer Choice B plaintext
See Answer

MCQ 2 The process of disguising plaintext in such a way that its substance gets hidden (into what is known as cipher-text) is called _________________.

Correct Answer Choice D encryption
See Answer

MCQ 3 In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered in different ways to accomplish the attack.

Correct Answer Choice B active
See Answer

MCQ 4 In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

Correct Answer Choice B Decryption key
See Answer


MCQ 5 It provides one time session keys between two parties or persons joins each other.

Correct Answer Choice A Diffie Hellman
See Answer

MCQ 6 Public key cryptography used in

Correct Answer Choice C RSA Algorithm
See Answer

MCQ 7 Which is the threads for clients?

Correct Answer Choice D All of the above
See Answer

MCQ 8 The substitutional cipers are _____________________.

Correct Answer Choice D Both A and C
See Answer


MCQ 9 In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.

Correct Answer Choice B Stream cipher
See Answer

MCQ 10 The process of transforming plain text to unreadable text.

Correct Answer Choice B Encryption
See Answer

MCQ 11 In symmetric-key cryptography, the same key is used by

Correct Answer Choice D Both Party
See Answer

MCQ 12 In Cryptography, the original message, before being transformed, is called ____________________.

Correct Answer Choice C Cipher text
See Answer


MCQ 13 In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

Correct Answer Choice B Long
See Answer

MCQ 14 Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key? (Assymmetric Encryption)

Correct Answer Choice A A so called "one way function with back door" is applyed for the encryption
See Answer

MCQ 15 The ciphers of today are called __________________________.

Correct Answer Choice B Round ciphers
See Answer

MCQ 16 Full form of TSP.

Correct Answer Choice A Time stamping Protocol
See Answer


MCQ 17 A digital signature needs a _________________.

Correct Answer Choice A public key system
See Answer

MCQ 18 Cryptography can be divided into __________________ types.

Correct Answer Choice D 2
See Answer

MCQ 19 In symmetric-key cryptography, the key locks and unlocks the box is

Correct Answer Choice A same
See Answer

MCQ 20 A session symmetric key between two persons or parties is used

Correct Answer Choice B Only once
See Answer


MCQ 21 Study of creating a d using encryption and decryption techniques.

Correct Answer Choice C Cryptography
See Answer

MCQ 22 _______________ is the mathematical procedure or algorithm which produces a cipher-text for any specified plaintext.

Correct Answer Choice A Encryption Algorithm
See Answer

MCQ 23 There are ______________ types of cryptographic techniques used in general.

Correct Answer Choice B 3
See Answer

MCQ 24 A substitution cipher replaces one symbol with the ________________.

Correct Answer Choice B another
See Answer


MCQ 25 Which agency assigns IP address

Correct Answer Choice C ICANN
See Answer

NTSE, NEET, AIEEE, Olympiad & Other Competive Exams Preparation

Publish Your Article / Write for Us

Article Writing Guide/Help

Trending Questions


Advantages Of NCERT, CBSE & State Boards Solutions For All Subjects

  • All the NCERT Solutions have been prepared by academic experts having 10+ years of teaching experience.
  • They have prepared all the solutions in simple and easy language, so that each and every student can understand the concepts easily.
  • All the solutions have been explained step to step wise in details with better explainations.
  • Students can also use these question and answers for your assignments and in homework help.
  • All the solutions have been explained in detail and the answers have been compiled in a step-wise manner.
  • All the question and asnwers are commonly prepared according to the Latest Syllabus of Board Education and Guidelines.
  • Students can know about the various types of questions asked in the exams with the help of these solutions.

Top Course Categories