Branch Wise MCQComputer Science McqsCyber Security 100+ MCQ & Answer Cyber Security | page-09 | Computer Course MCQ And Answer January 28, 2025 DSN MARATHI 81. A asymmetric-key (or public key ) cipher uses A. 1 key B. 2 key C. 3 key D. 4 key Answer Option : B 82. _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. A. Malware Analysis B. Exploit writing C. Reverse engineering D. Cryptography Answer Option : D 83. __________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it. A. Malware Analysis B. Cryptography C. Reverse engineering D. Exploit writing Answer Option : B 84. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data. A. secret key B. external programs C. add-ons D. secondary key Answer Option : A 85. Conventional cryptography is also known as _____________ or symmetric-key encryption. A. secret-key B. public key C. protected key D. primary key Answer Option : A 86. The procedure to add bits to the last block is termed as ______________ A. decryption B. hashing C. tuning D. padding Answer Option : D 87. ECC encryption system is ________ A. symmetric key encryption algorithm B. asymmetric key encryption algorithm C. not an encryption algorithm D. block cipher method Answer Option : B 88. ______function creates a message digest out of a message. A. encryption B. decryption C. hash D. none of the above Answer Option : C 89. Extensions to the X.509 certificates were added in version ____ A. 1 B. 2 C. 3 D. 4 Answer Option : C 90. A digital signature needs ____ system A. symmetric-key B. asymmetric-key C. either (a) or (b) D. neither (a) nor (b) Answer Option : B
81. A asymmetric-key (or public key ) cipher uses A. 1 key B. 2 key C. 3 key D. 4 key Answer Option : B
82. _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. A. Malware Analysis B. Exploit writing C. Reverse engineering D. Cryptography Answer Option : D
83. __________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it. A. Malware Analysis B. Cryptography C. Reverse engineering D. Exploit writing Answer Option : B
84. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data. A. secret key B. external programs C. add-ons D. secondary key Answer Option : A
85. Conventional cryptography is also known as _____________ or symmetric-key encryption. A. secret-key B. public key C. protected key D. primary key Answer Option : A
86. The procedure to add bits to the last block is termed as ______________ A. decryption B. hashing C. tuning D. padding Answer Option : D
87. ECC encryption system is ________ A. symmetric key encryption algorithm B. asymmetric key encryption algorithm C. not an encryption algorithm D. block cipher method Answer Option : B
88. ______function creates a message digest out of a message. A. encryption B. decryption C. hash D. none of the above Answer Option : C
89. Extensions to the X.509 certificates were added in version ____ A. 1 B. 2 C. 3 D. 4 Answer Option : C
90. A digital signature needs ____ system A. symmetric-key B. asymmetric-key C. either (a) or (b) D. neither (a) nor (b) Answer Option : B