1.
Which of the following is the latest version of SHA?
Correct Answer
D. None of the above
Explanation
The correct answer is None of the above. The latest version of the Secure Hash Algorithm (SHA) is SHA-3, which was chosen in 2012 after a public competition among non-NSA designers. It supports the same hash lengths as SHA-2, and its internal structure differs significantly from the rest of the SHA family. As of now, there is no SHA-4 or SHA-4.1.
2.
Choose the odd one out.
Correct Answer
C. MAC
Explanation
RC5, ECC and Blowfish are encryption systems. MAC is a type of hardware address.
3.
Which of the following is not used by certificate system?
Correct Answer
D. Session ID
Explanation
The Certificate security system uses the basic logic of Public/Private key pairs in combination of session ID. There is no key such as session key.
4.
ECC is the encryption system used in cellular devices. T/F?
Correct Answer
A. True
Explanation
ECC is the encryption system used in cellular devices.
5.
Cryptography is an essential in encapsulation protocols. T/F?
Correct Answer
B. False
Explanation
Cryptography is essential in encryption protocols.
6.
Which of the following components decides how secure an encryption protocol is?
Correct Answer
C. Number of bits used for encryption by the algorithm
Explanation
The number of bits used for encryption by the algorithm decides how secure that encryption type will be.
7.
Cryptanalysis is nothing but pattern finding T/F?
Correct Answer
B. False
Explanation
Pattern finding is a part of cryptanalysis it does not form the entire process of cryptanalysis.
8.
In asymmetric-key encryption, one key will be used for encryption and another will be used for decryption to provide maximum security. T/F?
Correct Answer
A. True
Explanation
In asymmetric-key encryption, one key will be used for encryption as well as decryption.
9.
Which of the following is true regarding Caesar�s key value 3?
Correct Answer
A. It uses an offset value of 3 for sliding alpHabets
Explanation
According to Caesar�s Cipher key value of 3, you would be sliding up the alphabetical value by 3. The difference would be 2 and not 3. If A has to be represented by Caesar�s key value 3 system, it would be represented as C.
10.
Which of the following is an advantage of using conventional encryption?
Correct Answer
B. It is very fast
Explanation
When conventional encryption is used for stored data rather than the data being transmitted, encryption and decryption process can be very fast.
11.
The concept of public key cryptography was introduced by Julius Caesar. T/F?
Correct Answer
B. False
Explanation
The issues with key distribution faced by conventional encryption, was overcome by the Public-key cryptography concepts introduced by Diffie-Hellman.
12.
Which of the following is true?
Correct Answer
D. None of the above
Explanation
PK cryptography, or public-key cryptography, is not necessarily very complex and nearly impossible to set up. Additionally, in public-key cryptography, you use one key for encryption (the public key) and a different key for decryption (the private key). Therefore, the statement "You need just one single key for encrypting as well as decrypting in PK cryptography" is incorrect. Finally, both the public key and private key have specific functions: the public key is used for encryption, and the private key is used for decryption. Therefore, the statement "Public key can only encrypt and private key can only decrypt" is also incorrect.
13.
The higher the number of bits, more secure is the key. T/F?
Correct Answer
A. True
Explanation
Keys are measured by bits. Higher the value of keys used, more reliable will be the encryption system.
14.
A digital signature is used for which of the following?
Correct Answer(s)
A. Encrypting
B. Identifying
Explanation
A digital signature is used to establish Identity of the communicating user as well as encrypting in specific cases.
15.
Which of the following does cryptography use to encrypt?
Correct Answer
A. Hash
Explanation
When cryptography uses hash function on a plain text, a fixed length of data called the message digest is generated. This message digest helps to preserve the data integrity by generating a digest value when the data is transmitted.
16.
Even today only upto 20% of critical information being transmitted is really secure. T/F?
Correct Answer
A. True
Explanation
A lot of information being transmitted through the Internet is still not entirely secure. Only 15-20% of data transmission is completely secure.
17.
PKI uses which of the following to ascertain identity?
Correct Answer
A. Certificate
Explanation
Digital signature is ideal for an Intranet or LAN scenario. Handprint is used in Biometrics. PKI uses certificates for establishing Identity.
18.
PKI requires skilled and continuous maintenance on the network. T/F?
Correct Answer
A. True
Explanation
PKI when implemented on a network will require a skilled person to oversee its maintenance in the long run.
19.
Traditional PKI uses self assembly process to maintain security. T/F?
Correct Answer
B. False
Explanation
Traditional PKI us incapable of self assembly, which is a draw back with PKI.
20.
Which of the following is an improvement over PKI?
Correct Answer
B. SMSA
Explanation
SMSA is an improvement over PKI where implementation maintenance and administration is concerned. This is because SMSA is capable of self assembly.
21.
Which of the following statements is true?
Correct Answer
B. Given a public key it is very difficult to derive the private key
Explanation
Given a public key it is extremely difficult to derive a private key from it. A session ID is used to provide security to a key being transmitted and is not used to generate any key.
22.
Which of the following is an improvement over the scheme used in digital signatures?
Correct Answer
B. One-way hash functions
Explanation
One-way hash functions generate significantly less data and are much more.
23.
Which of the following is used to sign the certificate created by the CA?
Correct Answer
B. CA�s private key
Explanation
The certificate generated by the CA is signed using the CA�s private key.