Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
pinoybix.org/2017/08/mcq-in-cryptography-forouzan.html
August 14,
2017
This is the MCQ in Cryptography from book the Data Communications and Networking 4th
Edition by Behrouz A. Forouzan. If you are looking for a reviewer in datacom, topic in
Electronics Systems and Technologies (Communications Engineering) this will definitely help
you before taking the Board Exam.
1/12
1. One commonly used public-key cryptography method is the ______ algorithm.
A) RSS
B) RAS
C) RSA
D) RAA
View Answer:
Answer: Option C
Solution:
A) encryption
B) decryption
View Answer:
Answer: Option B
Solution:
A) ciphertext
B) plaintext
C) secret-text
View Answer:
Answer: Option A
Solution:
2/12
A) encryption
B) decryption
View Answer:
Answer: Option A
Solution:
5. The ________ method provides a one-time session key for two parties.
A) Diffie-Hellman
B) RSA
C) DES
D) AES
View Answer:
Answer: Option A
Solution:
6. A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a
formula to define the relationship between the input stream and the output stream.
A) S-box
B) P-box
C) T-box
View Answer:
Answer: Option A
Solution:
A) substitution
3/12
B) transposition
View Answer:
Answer: Option A
Solution:
A) substitution
B) transposition
View Answer:
Answer: Option B
Solution:
9. _______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.
A) AEE
B) AED
C) AER
D) AES
View Answer:
Answer: Option D
Solution:
A) ciphertext
B) plaintext
4/12
C) secret-text
View Answer:
Answer: Option B
Solution:
A) round
B) circle
C) square
View Answer:
Answer: Option A
Solution:
12. The _________ attack can endanger the security of the Diffie-Hellman method if two
parties are not authenticated to each other.
A) man-in-the-middle
B) ciphertext attack
C) plaintext attack
View Answer:
Answer: Option A
Solution:
A) cipher
B) secret
5/12
C) key
View Answer:
Answer: Option A
Solution:
A) private
B) public
C) either a or b
View Answer:
Answer: Option A
Solution:
A) two
B) three
C) four
D) five
View Answer:
Answer: Option B
Solution:
A) symmetric-key
B) asymmetric-key
6/12
D) neither (a) nor (b)
View Answer:
Answer: Option A
Solution:
17. DES uses a key generator to generate sixteen _______ round keys.
A) 32-bit
B) 48-bit
C) 54-bit
D) 42-bit
View Answer:
Answer: Option B
Solution:
A) transposition
B) additive
C) shift
View Answer:
Answer: Option C
Solution:
A) block
B) stream
C) field
7/12
View Answer:
Answer: Option A
Solution:
20. A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a
table to define the relationship between the input stream and the output stream.
A) S-box
B) P-box
C) T-box
View Answer:
Answer: Option B
Solution:
21. ________ DES was designed to increase the size of the DES key.
A) Double
B) Triple
C) Quadruple
View Answer:
Answer: Option B
Solution:
22. ________ is the science and art of transforming messages to make them secure and
immune to attacks.
A) Cryptography
B) Cryptoanalysis
8/12
View Answer:
Answer: Option A
Solution:
23. DES has an initial and final permutation block and _________ rounds.
A) 14
B) 15
C) 16
View Answer:
Answer: Option C
Solution:
A) 2
B) 3
C) 4
D) 5
View Answer:
Answer: Option C
Solution:
25. In a(n) ________ cipher, the same key is used by both the sender and receiver.
A) symmetric-key
B) asymmetric-key
View Answer:
Answer: Option A
9/12
Solution:
26. _________ ciphers can be categorized into two broad categories: monoalphabetic and
polyalphabetic.
A) Substitution
B) Transposition
View Answer:
Answer: Option A
Solution:
27. The _______ cipher is the simplest monoalphabetic cipher. It uses modular arithmetic
with a modulus of 26.
A) transposition
B) additive
C) shift
View Answer:
Answer: Option C
Solution:
A) private
B) public
View Answer:
Answer: Option B
10/12
Solution:
A) symmetric-key
B) asymmetric-key
View Answer:
Answer: Option B
Solution:
30. The _______ is a number or a set of numbers on which the cipher operates.
A) cipher
B) secret
C) key
View Answer:
Answer: Option C
Solution:
A) symmetric-key
B) asymmetric-key
View Answer:
Answer: Option A
Solution:
11/12
NEXT: MCQ in Network Security
12/12