MCQ 1 The original message, before being transformed, is
MCQ 2 The process of disguising plaintext in such a way that its substance gets hidden (into what is known as cipher-text) is called _________________.
MCQ 3 In _____________ sniffing, the network traffic is not only supervised & locked but also be can be altered in different ways to accomplish the attack.
MCQ 4 In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
MCQ 5 It provides one time session keys between two parties or persons joins each other.
MCQ 6 Public key cryptography used in
MCQ 7 Which is the threads for clients?
MCQ 8 The substitutional cipers are _____________________.
MCQ 9 In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.
MCQ 10 The process of transforming plain text to unreadable text.
MCQ 11 In symmetric-key cryptography, the same key is used by
MCQ 12 In Cryptography, the original message, before being transformed, is called ____________________.
MCQ 13 In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
MCQ 14 Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key? (Assymmetric Encryption)
MCQ 15 The ciphers of today are called __________________________.
MCQ 16 Full form of TSP.
MCQ 17 A digital signature needs a _________________.
MCQ 18 Cryptography can be divided into __________________ types.
MCQ 19 In symmetric-key cryptography, the key locks and unlocks the box is
MCQ 20 A session symmetric key between two persons or parties is used
MCQ 21 Study of creating a d using encryption and decryption techniques.
MCQ 22 _______________ is the mathematical procedure or algorithm which produces a cipher-text for any specified plaintext.
MCQ 23 There are ______________ types of cryptographic techniques used in general.
MCQ 24 A substitution cipher replaces one symbol with the ________________.
MCQ 25 Which agency assigns IP address