Branch Wise MCQComputer Science McqsCyber Security

100+ MCQ & Answer Cyber Security | page-09 | Computer Course MCQ And Answer

81.
A asymmetric-key (or public key ) cipher uses

82.
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

83.
__________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

84.
Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.

85.
Conventional cryptography is also known as _____________ or symmetric-key encryption.

86.
The procedure to add bits to the last block is termed as ______________

87.
ECC encryption system is ________

88.
______function creates a message digest out of a message.

89.
Extensions to the X.509 certificates were added in version ____

90.
A digital signature needs ____ system

Leave a Reply

Your email address will not be published. Required fields are marked *