Computer Awareness Quiz - Cryptography

September 4, 2015    

Cryptography is tool for protecting information in computer systems.
c) Latin
d) None of These
Q2. Cryptography is the study of information______:
b) Verification
c) Both of Above
d) None of These
Q3. Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in a communication:
a) Protocols
b) Algorithms
c) Strategies 
d) All of the Above
e) None of These
Q4. Cryptography and Cryptanalysis are sometimes grouped together under the ____term cryptology, encompassing the entire subject. In practice, "cryptography" is also often used to refer to the field as a whole, especially as an applied science:
a) Umbrella 
d) None of These
Q5. Cryptography is an interdisciplinary subject, drawing from several fields. Before the time of computers, it was closely related to linguistic. Nowadays the emphasis has shifted, and cryptography makes extensive use of technical ares of mathematics, especially those areas collectively known as _______mathematics:
a) Increte 
b) Discrete
c) Both of Above
d) None of These
Q6. An example of the sub - fields of cryptography is:
a) Steganography 
b) Traffic Analysis
c) Both of Above
d) None of These
Q7. Which among the following is correct:
a) Traffic Analysis is the analysis of patterns of communication in order to learn secret information.
b) Steganography  is the study of hiding the very existence of a message, and not necessarily the contents of the message itself like microdots or invisible ink.
c) Both of Above
d) None of These
Q8. When information is transformed from a useful form of understanding to an opaque form of understanding, this is called:
a) Encryption 
b) Decryption
c) Both of Above
d) None of These
Q9. When the information is reverted back into a useful form it is called:
a) Standard encryption 
b) Plain text encryption 
c) Decryption 
d) None of These
Q10. Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way):
a) Encryption
b) Decryption
c) Both of above
d) None of These
Q11. Symmetric key cryptography was the only kind of encryption publicly known until:
a) July 195
b) June, 1976
c) June 1988
d) None of These
Q12. Which among the following is correct about goals in cryptography:
a) Confidentiality - Only an authorized recipient should be able to extract the contents of the message from its encrypted form. Resulting from steps to hide, stop or delay free access to the encrypted information.
b) Message Integrity - The recipient should be able to determine if the message has been altered.
c) Sender Authentication - The recipient should be able to verify from the message, the identity of the sender, the origin or the path it traveled (or combinations) so to validate claims from emitter or to validated the recipient expectations.
d) Sender Non repudiation - The emitter should not be able to deny sending the message
e) None of These
f) All of the Above
Q13. License is still required to use cryptography in which among the following countries:
a) Iran and China
b) China and India
c) India and Pakistan
d) None of These
Q14. NSA stands for:
a) National Security Agency
b) Norway Security Agency
c) National Security Assessment
d) None of These
Q15. In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys:
a) Hand over passwords
b) Decrypt Files
c) Both of Above
d) None of These

Take previous Quiz


Computer awareness Quiz 123, 45678 , 9 , 1011 , 12131415161718 and 19. Take Database quiz , MS-Word quizPowerPoint quiznetwork security quizComputer memory  Computer languagesSoftware

This entry passed through the Full-Text RSS service - if this is your content and you're reading it on someone else's site, please read the FAQ at http://ift.tt/jcXqJW.



Computer Awareness Quiz - Cryptography 4.5 5 Yateendra sahu September 4, 2015 Cryptography is tool for protecting information in computer systems. c) Latin d) None of These Q2. Cryptography is the study of informa...


Related Post:

  • Current Affairs Quiz : 14 July 2016
    Join 40,000+ readers and get free notes in your email This entry passed through the Full-Text RSS service - if this is your content and you're reading it on someone else's site, please read the FAQ at http://ift.tt/jcXqJW. Recommended article from … Read More
  • Banking and Financial Awareness for SBI PO : Part - 4
    1. RBI allowed the Indian companies to issue ________ to nonresident  Share holders as bonus. a. Convertible preference shares b. Convertible non preference shares with penalty c. Non Convertible preference shares as bonus d. Irredeemable pre… Read More
  • General Awareness Quiz - Set 55
    1. Who among the following is not associated with the development of the nuclear program of India? a) PK Iyengar b) Vikram Sarabhai c) Homi J Bhabha d) Raja Ramanna 2. The tiny blood cells that circulate in the blood and clot to prevent bleeding … Read More
  • Mixed Aptitude Quiz for RBI Grade B Exam
    Ques 1. A man has some oranges , out of which 2% are rotten.He sells 95%of the remaining oranges. Now he is left with 49 oranges .How many oranges had he in all ? (a) 800 (b) 1000 (c) 600 (d) 9000 Ans 1. Let the number  of oranges the man had… Read More
  • IBPS RRB CWE -V Recruitment Process
    Dear Readers, The Ministry of Finance, Department of Financial Services, Government of India has issued a letter to NABARD regarding the recruitment process in Regional Rural Banks (RRBs) through IBPS CWE-V. The notice is given below: Join 40,000… Read More
Load comments

No comments:

Post a Comment