Cryptography is tool for protecting information in computer systems.
Must read - Bitcoins - Important facts you need to know
Q1. Cryptography is derived from the ____word:
a) Greek
b) French
c) Latin
d) None of These
d) None of These
Q2. Cryptography is the study of information______:
a) Hiding
b) Verification
c) Both of Above
d) None of These
d) None of These
Q3. Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication:
a) Protocols
b) Algorithms
c) Strategies
d) All of the Above
e) None of These
Q4. Cryptography and Cryptanalysis are sometimes grouped together under the ____term cryptology, encompassing the entire subject. In practice, "cryptography" is also often used to refer to the field as a whole, especially as an applied science:
a) Umbrella
b) Shield
c) Veil
d) None of These
Q5. Cryptography is an interdisciplinary subject, drawing from several fields. Before the time of computers, it was closely related to linguistic. Nowadays the emphasis has shifted, and cryptography makes extensive use of technical ares of mathematics, especially those areas collectively known as _______mathematics:
a) Increte
b) Discrete
c) Both of Above
d) None of These
Q6. An example of the sub - fields of cryptography is:
a) Steganography
b) Traffic Analysis
c) Both of Above
d) None of These
d) None of These
Q7. Which among the following is correct:
a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information.
b) Steganography is the study of hiding the very existence of a message, and not necessarily the contents of the message itself like microdots or invisible ink.
c) Both of Above
d) None of These
Q8. When information is transformed from a useful form of understanding to an opaque form of understanding, this is called:
a) Encryption
b) Decryption
c) Both of Above
d) None of These
Q9. When the information is reverted back into a useful form it is called:
a) Standard encryption
b) Plain text encryption
c) Decryption
d) None of These
Q10. Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way):
a) Encryption
b) Decryption
c) Both of above
d) None of These
Q11. Symmetric key cryptography was the only kind of encryption publicly known until:
a) July 195
b) June, 1976
c) June 1988
d) None of These
Q12. Which among the following is correct about goals in cryptography:
a) Confidentiality - Only an authorized recipient should be able to extract the contents of the message from its encrypted form. Resulting from steps to hide, stop or delay free access to the encrypted information.
b) Message Integrity - The recipient should be able to determine if the message has been altered.
c) Sender Authentication - The recipient should be able to verify from the message, the identity of the sender, the origin or the path it traveled (or combinations) so to validate claims from emitter or to validated the recipient expectations.
d) Sender Non repudiation - The emitter should not be able to deny sending the message
e) None of These
f) All of the Above
Q13. License is still required to use cryptography in which among the following countries:
a) Iran and China
b) China and India
c) India and Pakistan
d) None of These
Q14. NSA stands for:
a) National Security Agency
b) Norway Security Agency
c) National Security Assessment
d) None of These
d) None of These
Q15. In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys:
a) Hand over passwords
b) Decrypt Files
c) Both of Above
d) None of These
Take previous Quiz
Computer awareness Quiz 1, 2, 3, 4, 5, 6, 7, 8 , 9 , 10, 11 , 12, 13, 14, 15, 16, 17, 18 and 19. Take Database quiz , MS-Word quiz, PowerPoint quiz, network security quiz. Computer memory Computer languages, Software.