πŸ“Š Information Cyber Security
Q. In asymmetric key cryptography, the two keys e and d, have special relationship to
  • (A) others
  • (B) data
  • (C) keys
  • (D) each other
πŸ’¬ Discuss
βœ… Correct Answer: (D) each other
πŸ“Š Information Cyber Security
Q. In cryptography, the order of the letters in a message is rearranged by __________
  • (A) transpositional ciphers
  • (B) substitution ciphers
  • (C) both transpositional ciphers and substitution ciphers
  • (D) quadratic ciphers
πŸ’¬ Discuss
βœ… Correct Answer: (A) transpositional ciphers
πŸ“Š Information Cyber Security
Q. Which one of the following algorithm is not used in asymmetric-key cryptography?
  • (A) rsa algorithm
  • (B) diffie-hellman algorithm
  • (C) electronic code book algorithm
  • (D) dsa algorithm
πŸ’¬ Discuss
βœ… Correct Answer: (C) electronic code book algorithm
πŸ“Š Information Cyber Security
Q. In asymmetric key cryptography, the private key is kept by __________
  • (A) sender
  • (B) receiver
  • (C) sender and receiver
  • (D) all the connected devices to the network
πŸ’¬ Discuss
βœ… Correct Answer: (B) receiver
πŸ“Š Information Cyber Security
Q. In cryptography, what is cipher?
  • (A) algorithm for performing encryption and decryption
  • (B) encrypted message
  • (C) both algorithm for performing encryption and decryption and encrypted message
  • (D) decrypted message
πŸ’¬ Discuss
βœ… Correct Answer: (A) algorithm for performing encryption and decryption
πŸ“Š Information Cyber Security
Q. Which is the largest disadvantage of the symmetric Encryption?
  • (A) more complex and therefore more time-consuming calculations.
  • (B) problem of the secure transmission of the secret key.
  • (C) less secure encryption function.
  • (D) isn\t used any more.
πŸ’¬ Discuss
βœ… Correct Answer: (B) problem of the secure transmission of the secret key.