This set of Cyber Security Multiple Choice Questions & Answers (MCQs) focuses on “Types of Cryptography – 1”.

1. _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

a) Malware Analysis

b) Exploit writing

c) Reverse engineering

d) Cryptography

View Answer

Explanation: Cryptography is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. It is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

2. ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

a) Malware Analysis

b) Cryptography

c) Reverse engineering

d) Exploit writing

View Answer

Explanation: Cryptography is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it where “kryptos” means secret, “graphein” means to-write.

3. When plain text is converted to unreadable format, it is termed as _____________

a) rotten text

b) raw text

c) cipher-text

d) ciphen-text

View Answer

Explanation: Cryptography helps in securing information in a specific format so that only intended users can understand or process it. When plain text is converted to the unreadable format, that type of text is termed as cipher-text.

4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.

a) secret key

b) external programs

c) add-ons

d) secondary key

View Answer

Explanation: When plain text is converted to unreadable format through some algorithms, that type of text is termed as cipher text. Cryptographic algorithms are based on mathematical algorithms where these algorithms use the secret key for a secure transformation of data.

5. Cryptography can be divided into ______ types.

a) 5

b) 4

c) 3

d) 2

View Answer

Explanation: Cryptography can be divided into two types. These are classic cryptography & modern cryptography. Using these techniques, users can secure their information from illegitimate ones.

6. Data which is easily readable & understandable without any special algorithm or method is called _________________

a) cipher-text

b) plain text

c) raw text

d) encrypted text

View Answer

Explanation: The means of storing or sending data in a specific format so that only intended users can process it is called cryptography. Data which is easily readable & understandable without any special algorithm or method is called plain text.

7. Plain text are also called _____________

a) cipher-text

b) raw text

c) clear-text

d) encrypted text

View Answer

Explanation: Data which is easily readable & understandable without any special algorithm or method is called plain text or clear-text. This text is not secured and can be readable by anyone who is not even a legitimate user.

8. There are ________ types of cryptographic techniques used in general.

a) 2

b) 3

c) 4

d) 5

View Answer

Explanation: There are three types of cryptographic techniques used in general. These are Symmetric Key cryptography, public key cryptography, and Hash functions based cryptography.

9. Conventional cryptography is also known as _____________ or symmetric-key encryption.

a) secret-key

b) public key

c) protected key

d) primary key

View Answer

Explanation: The various cryptographic techniques are symmetric Key cryptography, public key cryptography, and Hash functions based cryptography. Conventional cryptography is also known as secret-key cryptography or symmetric-key encryption.

10. Data Encryption Standard is an example of a _____________ cryptosystem.

a) conventional

b) public key

c) hash key

d) asymmetric-key

View Answer

Explanation: Conventional cryptography is also known as secret-key cryptography or symmetric-key encryption. Data Encryption Standard is an example of a conventional cryptosystem.

11. _______________ cryptography deals with traditional characters, i.e., letters & digits directly.

a) Modern

b) Classic

c) Asymmetric

d) Latest

View Answer

Explanation: Cryptography can be divided into two types. These are classic cryptography & modern cryptography. Classic cryptography deals with traditional characters, i.e., letters & digits directly.

12. ____________ cryptography operates on binary-bit series and strings.

a) Modern

b) Classic

c) Traditional

d) Primitive

View Answer

Explanation: Cryptography can be divided into two types. These are classic cryptography & modern cryptography. Modern cryptography operates on binary-bit series and strings.

13. __________ cryptography has always been focussing on the concept of ‘security through obscurity’.

a) Modern

b) Asymmetric

c) Classic

d) Latest

View Answer

Explanation: Cryptography can be divided into two types. These are classic cryptography & modern cryptography. Classic cryptography deals with traditional characters, i.e., letters & digits directly. It is based on the concept of ‘security through obscurity’.

14. ________________ cryptography is based on publicly known mathematically designed algorithms to encrypt the information.

a) Modern

b) Classic

c) Traditional

d) Primitive

View Answer

Explanation: There are 2 types of cryptography – classic cryptography & modern cryptography. Modern cryptography operates on binary-bit series and strings. It is based on publicly known mathematically designed algorithms to encrypt the information.

**Sanfoundry Global Education & Learning Series – Cyber Security.**

To practice all areas of Cyber Security, __here is complete set of 1000+ Multiple Choice Questions and Answers__.