V Vikash Gupta π Tutor III β 33.56K Points π Information Cyber Security Q. is the art & science of cracking the cipher-text without knowing the key. (A) cracking (B) cryptanalysis (C) cryptography (D) crypto-hacking ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) cryptanalysis
S Shiva Ram π Master β 30.44K Points π Information Cyber Security Q. Conventional cryptography is also known as or symmetric-key encryption. (A) secret-key (B) public key (C) protected key (D) primary key ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) secret-key
R Rakesh Kumar π Hard Worker β 28.44K Points π Information Cyber Security Q. Cryptanalysis is used (A) to find some insecurity in a cryptographic scheme (B) to increase the speed (C) to encrypt the data (D) to make new ciphers ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) to find some insecurity in a cryptographic scheme
R Ram Sharma π Coach β 193.88K Points π Information Cyber Security Q. The procedure to add bits to the last block is termed as (A) decryption (B) hashing (C) tuning (D) padding ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) padding
A Admin π Coach β 38.23K Points π Information Cyber Security Q. In asymmetric key cryptography, the private key is kept by __________ (A) sender (B) receiver (C) sender and receiver (D) none of these ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) receiver
P Praveen Singh π Tutor III β 36.81K Points π Information Cyber Security Q. __is the practice of concealing a message within another message,image or file. (A) steganography (B) cryptography (C) cipher (D) receiver ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) steganography
G Gopal Sharma π Tutor III β 38.32K Points π Information Cyber Security Q. The__is a polygraphic substitution cipher based on linear algebra. (A) hill cipher (B) playfair cipher (C) affine cipher (D) none of these ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (A) hill cipher
S Shiva Ram π Master β 30.44K Points π Information Cyber Security Q. AES stands for? (A) authorized encryption standard (B) advance encryption standard (C) advance encryption strategy (D) none of these ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) advance encryption standard
V Vikash Gupta π Tutor III β 33.56K Points π Information Cyber Security Q. S/MIME is abbreviated as __________________ (A) secure/multimedia internet mailing extensions (B) secure/multipurpose internet mailing extensions (C) secure/multimedia internet mail extensions (D) secure/multipurpose internet mail extensions ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (D) secure/multipurpose internet mail extensions
S Shiva Ram π Master β 30.44K Points π Information Cyber Security Q. In SSL, what is used for authenticating a message? (A) mac (message access code) (B) mac (message authentication code) (C) mac (machine authentication code) (D) mac (machine access code) ποΈ Show Answer π¬ Discuss π Share β‘Menu β Correct Answer: (B) mac (message authentication code)