17th
Jun

# Cryptography MCQ

• 17th Jun, 2022
• 812 Followers

## Take Cryptography MCQ Test & Online Quiz to Test Your Knowledge

Practice Below Cryptography MCQ test that checks your basic knowledge of Cryptography. This Cryptography MCQ Test contains 20 Multiple Choice Questions. You have to select the right answer to the question. apart from this, you can also download cryptography mcq pdf completly free.

## Cryptography MCQ

### 1) What is Cryptography?

• A. Study Communications
• B.Secure Communications
• C.Both A and B
• D.None of the above

### 2) Caesar Cipher is an example of

• A. Poly-alphabetic Cipher
• B.Bi-alphabetic Cipher
• C.Mono-alphabetic Cipher
• D.Multi-alphabetic Cipher

• A. 1 key
• B.2 key
• C.3 key
• D.4 key

### 4) The shift cipher is sometimes referred to as the

• A. Cipher
• B.Shift cipher
• C.Caesar cipher
• D.Cipher text

### 5) The substitutional ciphers are

• A. bialphabetic
• B.polyalphabetic
• C.semi alphabetic
• D.monoalphabatic

### 6) The Acronym DES stands for

• A. Digital Encryption System
• B.Digital Evaluation System
• C.Digital Encryption Standard
• D.Double Encryption Standard

### 7) Cryptography, a word with Greek origins, means

• A. Open Writing
• B.Secret Writing
• C.Closed Writing
• D.Corrupting Data

### 8) Cryptography can provide

• A. Confidentiality
• B.Entity authentication
• C.Nonrepudiation of messages
• D.All of above

### 9) WTLS stands for?

• A. Wireless Transfer System Layer
• B.Wireless Transfer Security Layer
• C.Wireless Transport System Layer
• D.Wireless Transport Security Layer

### 10) Which one is the Heart of Data Encryption Standard

• A. Cipher
• B.Rounds
• C.Encryption
• D.DES function

### 11) A mechanism used to encrypt and decrypt data

• A. Data flow
• B.Algorithm
• C.Cryptography
• D.None of the above

### 12) PKI stands for ________

• A. public key instance
• B.private key instance
• C.public key infrastructure
• D.private key infrastructure

### 13) ECB and CBC are ________ ciphers.

• A. Field
• B.Block
• C.Stream
• D.None of the above

• A. 1
• B.2
• C.3
• D.4

### 15) Who started cryptography?

• A. Oracle
• B.Spartans
• C.React
• D.All of above

### 16) MALWARE stand for________

• A. Malicious Software
• B.Multipurpose Software
• C.Malfunctioned Software
• D.All of above

### 17) Electronic Code Book process is used in ________

• A. Caesar cipher
• B.Block cipher
• C.Antisymmetric cipher
• D.Stream cipher

• A. 10 bits
• B.12 bits
• C.24 bits
• D.64 bits

### 19) There is no secret key in case of _______

• A. RSA encryption
• B.Symmetric ciphers
• C.Asymmetric ciphers
• D.Alpha-numeric cryptography

### 20) Symmetric-key cryptography is mainly used in our network security

• A. True
• B.False

Valid name is required.

Valid name is required.

Valid email id is required.

01st
Jan

01st
Jun

01st
Feb

01st
Feb

01st
Feb

01st
Feb