R Ranjeet π Tutor III β 34.60K Points π Information Cyber Security Q. In asymmetric key cryptography, the two keys e and d, have special relationship to (A) others (B) data (C) keys (D) each other ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) each other
G Gopal Sharma π Tutor III β 38.32K Points π Information Cyber Security Q. A asymmetric-key (or public key ) cipher uses (A) 1 key (B) 2 key (C) 3 key (D) 4 key ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) 2 key
P Praveen Singh π Tutor III β 36.81K Points π Information Cyber Security Q. What is data encryption standard (DES)? (A) block cipher (B) stream cipher (C) bit cipher (D) byte cipher ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) block cipher
V Vikash Gupta π Tutor III β 33.56K Points π Information Cyber Security Q. In cryptography, the order of the letters in a message is rearranged by __________ (A) transpositional ciphers (B) substitution ciphers (C) both transpositional ciphers and substitution ciphers (D) quadratic ciphers ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) transpositional ciphers
P Priyanka Tomar π Tutor III β 35.28K Points π Information Cyber Security Q. Which one of the following algorithm is not used in asymmetric-key cryptography? (A) rsa algorithm (B) diffie-hellman algorithm (C) electronic code book algorithm (D) dsa algorithm ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (C) electronic code book algorithm
V Vijay Sangwan π Mover β 28.62K Points π Information Cyber Security Q. In asymmetric key cryptography, the private key is kept by __________ (A) sender (B) receiver (C) sender and receiver (D) all the connected devices to the network ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) receiver
G Gopal Sharma π Tutor III β 38.32K Points π Information Cyber Security Q. In cryptography, what is cipher? (A) algorithm for performing encryption and decryption (B) encrypted message (C) both algorithm for performing encryption and decryption and encrypted message (D) decrypted message ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) algorithm for performing encryption and decryption
R Ranjeet π Tutor III β 34.60K Points π Information Cyber Security Q. Which is the largest disadvantage of the symmetric Encryption? (A) more complex and therefore more time-consuming calculations. (B) problem of the secure transmission of the secret key. (C) less secure encryption function. (D) isn\t used any more. ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) problem of the secure transmission of the secret key.
R Ram Sharma π Coach β 193.88K Points π Information Cyber Security Q. Which of the following Algorithms not belong to symmetric encryption (A) 3des (tripledes) (B) rsa (C) rc5 (D) idea ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) rsa
V Vikash Gupta π Tutor III β 33.56K Points π Information Cyber Security Q. What type of attack uses a fraudulent server with a relay address? (A) ntlm (B) mitm (C) netbios (D) smb ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) mitm