1. Which one is DES?
a) Block cipher
b) Bit cipher
c) Stream cipher
d) None of the above
2. An asymmetric-key cipher uses
a)Â 1 Key
b) 2 Key
c) 3 Key
d) 4 Key
3. Cryptography term is used to transforming messages to make them secure and to prevent from
a) Change
b) Defend
c) Idle
d) Attacks
4. Shift cipher is also referred to as the
a)Â Caesar cipher
b) cipher text
c) Shift cipher
d) None of the above
5. Which one is the Heart of Data Encryption Standard (DES)?
a)Â DES function
b) Encryption
c) Rounds
d) Cipher
6. DES stands for…………………
a)Â Data Encryption Slots
b) Data Encryption Subscription
c) Data Encryption Standard
d) Data Encryption Solutions
7. What is cipher in Cryptography?
a)Â Algorithm for performing encryption
b) Algorithm for performing decryption
c) Encrypted Messages
d) Both algorithm for performing encryption and Decryption and encrypted message
8. In cryptography, the original message before being transformed, is
 a) Simple Text
b) Cipher Text
c) Empty Text
d) Â plain text
9. Which of these is a technique that is used to verify a message’s integrity?
a)Â Message Digest
b) Protocol
c) Decryption algorithm
d) Digital signature
10. Using the cipher algorithm, which of these types of text would be transformed?
 a) Plain text
b) Scalar text
c) Complex text
d) Transformed text
11. Which of these is NOT involved in the CIA Triad ?
a)Â Confidentiality
b) Availability
c) Integrity
d) Authenticity
12. ECB in the context of digital cryptography stands for
a)Â Electrical Circuit Board
b) Electronic Code Book
c) Electrical Code Book
d) Electronic Circuit Book
13. Which of the following statements describe a type of Phishing attack?
a)Â Sending someone an email that contains a malicious link by disguising to appear like an email from someone the person knows.
b) Creating a fake website that appears to be identical to the real website and trick users to enter their login information
c) Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest.
d) All of the above
14. Which one of the following techniques used by hackers to trick the users in order to disclose their username and passwords through fake websites?Â
a)Â Social Engineering
b) Cookie stealing
c) Phishing
d) Cyber stalking
15. The encryption technique that uses one message to hide another message is called _____ .
a)Â MDAÂ
b) Hashing
c) Steganography
d) None of the above
16. Â ________Â is the term used in computer security to protect your data from getting disclosed.
 a) IntegrityÂ
b) Authentication
c) Confidentiality
d) Availability
17. ___________ is the term used in computer security to protect the data from being modified by the unauthorized user.
a)Â Integrity
b) Authentication
c) Confidentiality
d) Availability
18. Which algorithm can ensure data integrity?
 a) RSA
b) AES
c) MD5
d) PKI
19. What is the key space of an encryption algorithm ?
a)Â the set of all possible values used to generate a key
b) the set of procedures used to calculate asymmetric keys
c) the set of hash functions used to generate a key
d) the mathematical equation that is used to create a key
20. Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?
a)Â private key from Bob
b)Â private key from Alice
c)Â Â public key from Bob
d) username and password from Alice
21. Which three security services are provided by digital signatures? (Choose three.)
a)Â provides non-repudiation using HMAC functions
b)Â guarantees data has not changed in transit
c)Â Â provides data encryption
d) authenticates the source
e)Â provides confidentiality of digitally signed data
f)Â Â Â authenticates the destination
22. Cryptanalysis is used   Â
a)    to find some insecurity in a cryptographic scheme  Â
b)Â Â to increase the speed
c)Â Â Â to encrypt the data
d) to make new ciphers
23. What is data encryption standard (DES)?
a)Â block cipher
b)Â stream cipher
c)Â Â bit cipher
d) byte cipher
24. In cryptography, the order of the letters in a message is rearranged by
a)Â transposition ciphers
b)Â substitution ciphers
c)Â Â both
d) quadratic ciphers
25. In cryptography, what is cipher?
a)Â algorithm for performing encryption and decryption
b)Â encrypted message
c)Â Â both algorithm for performing encryption and decryption and encrypted message
d) decrypted message
26. The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not
a)Â Authenticated
b) Joined
c) Submit
d) Separate
 27. A straight permutation cipher or a straight p-box has the same number of input as
a)Â Cipher
b)Â Frames
c)Â Â Outputs
d) Bits
28. A person who enjoys learning details about computers and how to enhance their capabilities.
 a) Cracker
b)Â Hacker
c)Â Â app controller
d) site controller
29. A process of making the encrypted text readable again.
a)Â Decryption
b)Â Encryption
c)Â Â network security
d) information hiding
30. The process of transforming plain text into unreadable text.
a)Â Decryption
b)Â Encryption
c)Â Â network security
d) information hiding
31. A transposition cipher reorders (permutes) symbols in a
a)Â block of packets
b)Â block of slots
c)Â Â block of signals
d) block of symbols
32. Cryptography, a word with Greek origins, means
 a) corrupting data
b)Â secret writing
c)Â Â open writing
d) closed writing
33. In public key cryptosystem __keys are used for encryption and decryption.
a)Â Same
b)Â Different
c)Â Â encryption keys
d) none of the mentioned
34. In RSA, Ф(n) = in terms of p and q
a)Â (p)/(q)
b)Â (p)(q)
c)Â Â (p-1)(q-1)
d) (p+1)(q+1)
35. For RSA to work, the value of P must be less than the value ofÂ
a)Â P
b)Â Q
c)Â Â N
d) F
36. In Asymmetric key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
 a) Short
b)Â Long
c)Â Â Flat
d) Thin
37. Which of the following is not a type of symmetric-key cryptography technique?
a)Â caesar cipher
b)Â data encryption standard (des)
c)Â Â diffie hellman cipher
d) playfair cipher
38. Computation of the discrete logarithm is the basis of the cryptographic system
a)Â symmetric cryptography
b)Â asymmetric cryptography
c)Â Â diffie-hellman key exchange
d) secret key cryptography
39. Which of the following is a mode of operation for the Block ciphers in cryptography?
a)Â electronic code book (ecb)
b)Â cipher block chaining (cbc)
c)Â Â counter (ctr) mode
d) all of the above
40. The DES algorithm has a key length of
a)Â 128 bits
b)Â 32 bits
c)Â Â 64 bits
d) 16 bits
41. The number of unique substitution boxes in DES after the 48 bit XOR operation are
a)Â 8
b)Â 4
c)Â Â 6
d) Â 12
42. The Initial Permutation table/matrix is of sizeÂ
a) 16×8
b) 4×8
c)  12×8
d) 8×8
43. DES follows Â
a)Â hash algorithm
b)Â caesars cipher
c)Â Â feistel cipher structure
d) sp networks
44. The DES Algorithm Cipher System consists of ____rounds (iterations) each with a round key.Â
a)Â 9
b)Â 12
c)Â Â 18
d) 16
45. For the AES-128 algorithm there are __ similar rounds and __ round is different.
 a) 2 pair of 5 similar rounds ; every alternate
b)Â 9 ; the last
c)Â Â 8 ; the first and last
d) 10 ; no
46. The 4×4 byte matrices in the AES algorithm are called
a)Â States
b) Words
c) Transitions
d) Permutations
47. AES uses a ___ bit block size and a key size of  _______ bits.
a)Â 128; 128 or 256
b)Â 64; 128 or 192
c)Â Â 256; 128, 192, or 256
d) 128; 128, 192, or 256
48. The process of writing the text as rows and read it as columns is known as
a)Â vernam cipher
b) ceaser cipher  Â
c)Â Â transposition columnar cipher
d) Â homophonic substitution cipher
49. Chosen cipher text attack is based on
 a) Cryptanalysis
b)Â Cryptography
c)Â Â Encryption
d) Decryption
50. Rail Fence Technique is an example of
a)Â Substitution Cipher
b)Â Transposition Cipher
c)Â Â product cipher
d) ceaser cipher
51. Public key encryption is advantageous over Symmetric key Cryptography because ofÂ
a)Â Speed
b)Â Space
c)Â Â key exchange
d) key length
52. The sub key length at each round of DES isÂ
a)Â 32
b)Â 56
c)Â Â 48
d) 64