JOIN ADRE 2.0 Telegram Group

Cyber Security Multiple Choice Questions and Answers | Cyber Security MCQs

Questions
1 The Acronym DES stands for
A Digital Evaluation System
B Digital Encryption Standard
C Digital Encryption System
D Double Encryption Standard

Answer: Digital Encryption Standard
2 DES works by using
A permutation and substitution on 64 bit blocks of plain text
B only permutations on blocks of 128 bits
C exclusive ORing key bits with 64 bit blocks
D 4 rounds of substitution on 64 bit blocks with 56 bit keys

Answer: permutation and substitution on 64 bit blocks of plain text
Advertisement
Article and Schedule Quiz Start Test!

DOWNLOAD CURRENT AFFAIRS PDF FROM APP

3 DES

(i) is a symmetric key encryption method

(ii) guarantees absolute security

(iii) is implementable as hardware VLSI chip

(iv) is a public key encryption method

A i and ii
B ii and iii
C i and iii
D iii and iv

Answer: i and iii
4 DES using 56 bit keys
A Cannot be broken in reasonable time using presently available computers
B Can be broken only if the algorithm is known using even slow computers.
C Can be broken with presently available high performance computers.
D It is impossible to break ever.

Answer: Can be broken with presently available high performance computers.
5 Triple DES uses
A 168 bit keys on 64-bit blocks of plain text
B Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds.
C Works with 144 bit blocks of plain text and applies DES algorithm once.
D Uses 128 bit blocks of plain text and 112 bit keys and apply DES algorithm thrice.

Answer: Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds.
6 ripple DES
A Cannot be broken in reasonable time using presently available computers.
B Can be broken only if the algorithm is known using even slow computer.
C Can be broken with presently available high performance computers.
D It is impossible to break ever.

Answer: Cannot be broken in reasonable time using presently available computers.
7 Triple DES
A is a symmetric key encryption method
B guarantees excellent security
C is implementable as a hardware VLSI chip
D is public key encryption method with three keys.

Answer: guarantees excellent security
8 Public key encryption method is a system
A which uses a set of public keys one for each participant in e-Commerce
B in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.
C which uses the RSA coding system.
D which is a standard for use in e-Commerce.

Answer: in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.
9 Public key system is useful because
A it uses two keys.
B there is no key distribution problem as public key can be kept in a commonly accessible database.
C private key can be kept secret.
D it is a symmetric key system.

Answer: there is no key distribution problem as public key can be kept in a commonly accessible database.
10 In public key encryption if A wants to send an encrypted message
A A encrypts message using his private key
B A encrypts message using B’s private key
C A encrypts message using B’s public key
D A encrypts message using his public key

Answer: A encrypts message using B’s public key
11 Certification of Digital signature by an independent authority is needed because
A it is safe
B it gives confidence to a business
C the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership
D private key claimed by a sender may not be actually his

Answer: the authority checks and assures customers that the public key indeed belongs to the business which claims its ownership
12 The responsibility of a certification authority for digital signature is to authenticate the
A hash function used
B private keys of subscribers
C public keys of subscribers
D key used in DES

Answer: public keys of subscribers
13 While sending a signed message, a sender
A sends message key using public key encryption using DES and hashed message using public key encryption
B sends message using public key encryption and hashed message using DES
C sends both message and hashed message using DES
D sends both message and hashed message using public key encryption

Answer: sends message key using public key encryption using DES and hashed message using public key encryption
14 Hashed message is signed by a sender using
A his public key
B his private key
C receiver’s public key
D receiver’s private key

Answer: his private key
15 A hashing function for digital signature

(i) must give a hashed message which is shorter than the original message

(ii)must be hardware implementable

(iii) two different messages should not give the same hashed message

(iv) is not essential for implementing digital signature

A i and ii
B ii and iii
C i and iii
D iii and iv

Answer: i and iii
16 A digital signature is required

(i) to tie an electronic message to the sender’s identity

(ii)for non repudiation of communication by a sender

(iii) to prove that a message was sent by the sender in a court of law

(iv) in all e-mail transactions

A i and ii
B i, ii, iii
C i, ii, iii, iv
D ii, iii, iv

Answer: i, ii, iii
17 A digital signature is
A a bit string giving identity of a correspondent
B a unique identification of a sender
C an authentication of an electronic record by tying it uniquely to a key only a sender knows
D an encrypted signature of a sender

Answer: an authentication of an electronic record by tying it uniquely to a key only a sender knows
18 DES and public key algorithm are combined

(i) to speed up encrypted message transmission

(ii) to ensure higher security by using different key for each transmission

(iii) as a combination is always better than individual system

(iv) as it is required in e-Commerce

A i and ii
B ii and iii
C iii and iv
D i and iv

Answer: i and ii
19 Message can be sent more securely using DES by
A encrypting plain text by a different randomly selected key for each transmission
B encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system
C using an algorithm to implement DES instead of using hardware
D designing DES with high security and not publicizing algorithm used by it

Answer: encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system
20 In public key encryption system if A encrypts a message using his private key and sends it to B
A if B knows it is from A he can decrypt it using A’s public key
B Even if B knows who sent the message it cannot be decrypted
C It cannot be decrypted at all as no one knows A’s private key
D A should send his public key with the message

Answer: if B knows it is from A he can decrypt it using A’s public key

ADRE 2.0 FULL LENGTH MOCK TEST

Take Mock Tests

Missiles Mock Test Start Test!
SSC MTS Mock Test Start Test
IBPS CLERK MOCK TEST Start Test
SSC MTS 2022 JULY 26 Shift 1 (ENGLISH) Start Test!
SSC GD Previous Year Paper 2021 Nov 17 Shift - I (Hindi) Start Test!
SSC CGL Tier - 1 PYP 2022 April 21 Shift- 1 (ENGLISH) Start Test!
MPSC PAPER I MOCK TEST 1 (ENGLISH) Start Test!
IB Security Assistant Mock test 1 (english) Start Test!
UP POLICE CONSTABLE MOCK TEST 1 Start Test!
DELHI POLICE CONSTABLE MOCK TEST 1 (HINDI) Start Test!
Advertisement