Cyber Security Questions and Answers – Types of Cryptography – 1

This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Types of Cryptography – 1”.

1. _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
a) Malware Analysis
b) Exploit writing
c) Reverse engineering
d) Cryptography
View Answer

Answer: d
Explanation: Cryptography is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. It is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

2. ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
a) Malware Analysis
b) Cryptography
c) Reverse engineering
d) Exploit writing
View Answer

Answer: b
Explanation: Cryptography is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it where “kryptos” means secret, “graphein” means to-write.

3. When plain text is converted to unreadable format, it is termed as _____________
a) rotten text
b) raw text
c) cipher-text
d) ciphen-text
View Answer

Answer: c
Explanation: Cryptography helps in securing information in a specific format so that only intended users can understand or process it. When plain text is converted to the unreadable format, that type of text is termed as cipher-text.
advertisement
advertisement

4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
a) secret key
b) external programs
c) add-ons
d) secondary key
View Answer

Answer: a
Explanation: When plain text is converted to unreadable format through some algorithms, that type of text is termed as cipher text. Cryptographic algorithms are based on mathematical algorithms where these algorithms use the secret key for a secure transformation of data.

5. Cryptography can be divided into ______ types.
a) 5
b) 4
c) 3
d) 2
View Answer

Answer: d
Explanation: Cryptography can be divided into two types. These are classic cryptography & modern cryptography. Using these techniques, users can secure their information from illegitimate ones.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. Data which is easily readable & understandable without any special algorithm or method is called _________________
a) cipher-text
b) plain text
c) raw text
d) encrypted text
View Answer

Answer: b
Explanation: The means of storing or sending data in a specific format so that only intended users can process it is called cryptography. Data which is easily readable & understandable without any special algorithm or method is called plain text.

7. Plain text are also called _____________
a) cipher-text
b) raw text
c) clear-text
d) encrypted text
View Answer

Answer: c
Explanation: Data which is easily readable & understandable without any special algorithm or method is called plain text or clear-text. This text is not secured and can be readable by anyone who is not even a legitimate user.
advertisement

8. There are ________ types of cryptographic techniques used in general.
a) 2
b) 3
c) 4
d) 5
View Answer

Answer: b
Explanation: There are three types of cryptographic techniques used in general. These are Symmetric Key cryptography, public key cryptography, and Hash functions based cryptography.

9. Conventional cryptography is also known as _____________ or symmetric-key encryption.
a) secret-key
b) public key
c) protected key
d) primary key
View Answer

Answer: a
Explanation: The various cryptographic techniques are symmetric Key cryptography, public key cryptography, and Hash functions based cryptography. Conventional cryptography is also known as secret-key cryptography or symmetric-key encryption.
advertisement

10. Data Encryption Standard is an example of a _____________ cryptosystem.
a) conventional
b) public key
c) hash key
d) asymmetric-key
View Answer

Answer: a
Explanation: Conventional cryptography is also known as secret-key cryptography or symmetric-key encryption. Data Encryption Standard is an example of a conventional cryptosystem.

11. _______________ cryptography deals with traditional characters, i.e., letters & digits directly.
a) Modern
b) Classic
c) Asymmetric
d) Latest
View Answer

Answer: b
Explanation: Cryptography can be divided into two types. These are classic cryptography & modern cryptography. Classic cryptography deals with traditional characters, i.e., letters & digits directly.

12. ____________ cryptography operates on binary-bit series and strings.
a) Modern
b) Classic
c) Traditional
d) Primitive
View Answer

Answer: a
Explanation: Cryptography can be divided into two types. These are classic cryptography & modern cryptography. Modern cryptography operates on binary-bit series and strings.

13. __________ cryptography has always been focussing on the concept of ‘security through obscurity’.
a) Modern
b) Asymmetric
c) Classic
d) Latest
View Answer

Answer: c
Explanation: Cryptography can be divided into two types. These are classic cryptography & modern cryptography. Classic cryptography deals with traditional characters, i.e., letters & digits directly. It is based on the concept of ‘security through obscurity’.

14. ________________ cryptography is based on publicly known mathematically designed algorithms to encrypt the information.
a) Modern
b) Classic
c) Traditional
d) Primitive
View Answer

Answer: a
Explanation: There are 2 types of cryptography – classic cryptography & modern cryptography. Modern cryptography operates on binary-bit series and strings. It is based on publicly known mathematically designed algorithms to encrypt the information.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all areas of Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.