The Art of Cryptography Fresco play Questions

 The Art of Cryptography Fresco play Questions






💬Secret Key Cryptography is effective for Communication over insecure channels. 
Choose the correct option from below list 
(1)True 
(2)False
 Answer:-(2)False

💬Which of the following poses challenges in the breaking of the Vigenère Cipher?
Choose the correct option from below list
(1)Number of Shifts
(2)Secrecy of Key
(3)Length of the Key
(4)Frequency Analysis

Answer:-(3)Length of the Key

💬The algorithm that is considered to have electrified non-military cryptology and cryptanalysis is ________.
Choose the correct option from below list
(1)DES
(2)AES
(3)Caesar Cipher
(4)Vernam Cipher

Answer:-(4)Vernam Cipher


💬In cryptographic terms, what does cipher indicate?
 Choose the correct option from below list
 (1)The encrypted data
 (2)Both the options
 (3)The algorithm used for encryption and decryption 
 Answer:-(2)Both the options





💬Which of the following is most suitable to secure passwords?
 Choose the correct option from below list
 (1)Non-repudiation
(2)Encryption 
(3)Authorization 
(4)Authentication
 Answer:-(2)Encryption




💬In which of the following cryptographic methods is the order of the units in the data rearranged to form the ciphertext?
 (1)Substitution ciphers 
(2)Block ciphers 
(3)Stream ciphersTransmission errors are propagated in the following modes, except 
(4)Transpositional ciphers 
 Answer:-(4)Transpositional ciphers


💬RSA is a Deterministic Encryption Algorithm as there is no random component. 
Choose the correct option from below list
 (1)True
 (2)False
 Answer:-(1)True

💬RC4 is a block cipher.
Choose the correct option from below list
(1)False
(2)True

Answer:-(1)False

💬Which of the following is a pitfall in the Diffie-Hellman key exchange?
Choose the correct option from below list
(1)No Authentication
(2)Size of keys
(3)Computational Complexity
(4)Key refactoring

Answer:-(1)No Authentication

💬The method adopted by block cipher modes to generate unique ciphertexts even if the same plaintext is encrypted multiple times is________.
Choose the correct option from below list
(1)Initialization Vector
(2)Random Keys
(3)Padding
(4)Blockchain

Answer:-(1)Initialization Vector


💬The cryptographic method that is considered to be genuinely unbreakable is ________.
Choose the correct option from below list
(1)Vigenere Cipher
(2)AES
(3)IDEA
(4)One-time pad

Answer:-(4)One-time pad


💬Transmission errors are propagated in the following modes, except __________.
(a) Cipher Feedback Mode
(b) Output Feedback Mode
(c) Cipher Block Chaining

💬Which among the following may be addressed using message authentication?
Choose the correct option from below list
(1)Content modification
(2)Sequence modification
(3)All the options
(4)Timing modification
(5)Masquerade

Answer:-(3)All the options


💬Which among the following are steps in each round of AES algorithm? 
 Substitute Bytes

💬X signs a message digitally and sends it to Y. Which of the following is required for Y to verify the authenticity of the message?
(a) X’s public key
(b) Y’s private key
(c) X’s private key
(d) Y’s public key

💬Kerchkoff’s principle emphasizes that the cryptosystem should be accessible to the adversary without inconvenience.
Choose the correct option from below list
(1)False
(2)True

Answer:-(2)True


💬Which among the following is an active attack?
Select the correct option from below list
(1)Accessing restricted data
(2)User Impersonation
(3)Eavesdropping on network traffic
(4)Release of message content

Answer:-(2)User Impersonation


💬The avalanche effect is an undesirable property in cryptographic algorithms.
Choose the correct option from below list
(1)True
(2)False

Answer:-(2)False

💬The use of hashing algorithms includes ________.
Choose the correct option from below list
(1)Monitoring data integrity
(2)All the options
(3)Data Authentication
(4)Storing passwords

Answer:-(2)All the options


💬The primary goal of cryptanalysis is to __________.
Select the correct option from below list
(1)Find the insecurities of the cryptosystem
(2)Understand the design of the cryptosystem
(3)Analyze the efficiency of the cryptosystem
(4)Break the cryptosystem

Answer:-(1)Find the insecurities of the cryptosystem


💬The Diffie-Hellman algorithm is applicable for the exchange of keys between two parties only.
Select correct option from below list
(1)True
(2)False

Answer:-(2)False


💬Digital Signature is implemented using the __________.
Choose the correct option from below list
(1)Symmetric key System
(2)Keys are not used
(3)Public key system

Answer:-(3)Public key system


💬Which of the following is widely used in cryptography to create a trapdoor function to facilitate the exchange of keys?
Choose the correct option from below list
(1)Random Number generation
(2)Modular Arithmetic
(3)Elliptic Curves
(4)Factorization

Answer:-(4)Factorization

💬The Diffie-Hellman algorithm exploits the computational complexity of the __________ problem.
Select correct option from below list
(1)Discrete logarithm
(2)Integer factorization
(3)Exponential logarithm

Answer:-(1)Discrete logarithm




💬The size of the output produced by hash functions is __________
Choose the correct option from below list
(1)Always 128 bits
(2)Non-deterministic
(3)Fixed based on the hash algorithm
(4)Dependent on the size of the input block

Answer:-(3)Fixed based on the hash algorithm



Thank you for visiting💥💥💥💥💥💥💥💥💥💥💥💥




Post a Comment

Previous Post Next Post