Database Questions and Answers – Encryption and Its Applications

This set of Database Multiple Choice Questions & Answers (MCQs) focuses on “Encryption and Its Applications”.

1. ___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.
a) Encryption
b) Data mining
c) Internet Security
d) Architectural security
View Answer

Answer: a
Explanation: Encryption is also used to carry out other tasks, such as authentication.

2. In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
a) Encryption key
b) Decryption key
c) Primary key
d) Authorised key
View Answer

Answer: b
Explanation: Even if the message is intercepted by an enemy, the enemy, not knowing the key, will not be able to decrypt and understand the message.

3. Which of the following is not a property of good encryption technique?
a) Relatively simple for authorized users to encrypt and decrypt data
b) Decryption key is extremely difficult for an intruder to determine
c) Encryption depends on a parameter of the algorithm called the encryption key
d) None of the mentioned
View Answer

Answer: d
Explanation: Here a, b and c are the properties have to be present in a good design of an encryption technique.
advertisement
advertisement

4. In which of the following encryption key is used to encrypt and decrypt the data?
a) Public key
b) Private key
c) Symmetric key
d) Asymmetric key
View Answer

Answer: c
Explanation: In public-key (also known as asymmetric-key) encryption techniques, there are two different keys, the public key and the private key, used to encrypt and decrypt the data.

5. Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________
a) Dictionary attacks
b) Database attacks
c) Minor attacks
d) Random attacks
View Answer

Answer: a
Explanation: This happens when particularly if the encryption key is publicly available.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it?
a) Round key algorithm
b) Public key algorithm
c) Advanced Encryption Standard
d) Asymmetric key algorithm
View Answer

Answer: c
Explanation: The standard is based on the Rijndael algorithm.

7. Which of the following requires no password travel across the internet?
a) Readable system
b) Manipulation system
c) Challenge–response system
d) Response system
View Answer

Answer: c
Explanation: The database system sends a challenge string to the user. The user encrypts the challenge string using a secret password as encryption key and then returns the result. The database system can verify the authenticity of the user by decrypting the string with the same secret password and checking the result with the original challenge string.
advertisement

8. Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?
a) Not true, the message can also be decrypted with the Public Key
b) A so called “one way function with back door” is applied for the encryption
c) The Public Key contains a special function which is used to encrypt the message and which can only be reversed by the appropriate Private Key
d) The encrypted message contains the function for decryption which identifies the Private Key
View Answer

Answer: b
Explanation: An one-way function is a function which a computer can calculate quickly, but whose reversal would last months or years. An one-way function with back door can be reversed with the help of a couple of additional information (the back door), but scarcely without this information. The information for the back door is contained in the private Key.

9. Which is the largest disadvantage of symmetric Encryption?
a) More complex and therefore more time-consuming calculations
b) Problem of the secure transmission of the Secret Key
c) Less secure encryption function
d) Isn’t used any more
View Answer

Answer: b
Explanation: As there is only one key in the symmetrical encryption, this must be known by both sender and recipient and this key is sufficient to decrypt the secret message. Therefore it must be exchanged between sender and receiver in such a manner that an unauthorized person can in no case take possession of it.
advertisement

10. Which is the principle of the encryption using a key?
a) The key indicates which function is used for encryption. Thereby it is more difficult to decrypt an intercepted message as the function is unknown
b) The key contains the secret function for encryption including parameters. Only a password can activate the key
c) All functions are public, only the key is secret. It contains the parameters used for the encryption resp. decryption
d) The key prevents the user of having to reinstall the software at each change in technology or in the functions for encryption
View Answer

Answer: b
Explanation: The encoding of a message is calculated by an algorithm. If always the same algorithm would be used, it would be easy to crack intercepted messages. However, it isn’t possible to invent a new algorithm whenever the old one was cracked, therefore the possibility to parameterize algorithms is needed and this is the assignment of the key.

Sanfoundry Global Education & Learning Series – Database Management System.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.