JOBSEEKERS
Login
Sign Up
Jobseeker
Employer
Staffing Firm
Direct Client
Cryptography interview questions
Cryptography interview questions
Back
Take as many assements as you can to improve your validate your skill rating
Total Questions: 15
1. What is preferred way of encryption ?
A. pre shared secret key
B. using key distribution center (KDC)
C. public key-encryption
D. symmetric key
Show Correct Answer
Correct Answer is :
public key-encryption
2. What is not a role of encryption ?
A. It is used to protect data from unauthorized access during transmission
B. It is used to ensure user authentication
C. It is used to ensure data integrity
D. It is used to ensure data corruption doesn’t happens
Show Correct Answer
Correct Answer is :
It is used to ensure data corruption doesn’t happens
3. What is cipher-block chaining ?
A. Data is logically ‘ANDed’ with previous block
B. Data is logically ‘ORed’ with previous block
C. Data is logically ‘XORed’ with previous block
D. None of the mentioned
Show Correct Answer
Correct Answer is :
Data is logically ‘XORed’ with previous block
4. What is not an encryption standard ?
A. AES
B. TES
C. Triple DES
D. DES
Show Correct Answer
Correct Answer is :
TES
5. Which of following is not a stream cipher?
A. Two fish
B. RC5
C. RC4
D. TBONE
Show Correct Answer
Correct Answer is :
TBONE
6. In cryptography, what is cipher?
A. algorithm for performing encryption and decryption
B. encrypted message
C. both algorithm for performing encryption and decryption and encrypted message
D. none of the mentioned
Show Correct Answer
Correct Answer is :
algorithm for performing encryption and decryption
7. In asymmetric key cryptography, the private key is kept by
A. sender
B. receiver
C. sender and receiver
D. all the connected devices to the network
Show Correct Answer
Correct Answer is :
receiver
8. Which one of the following algorithm is not used in asymmetric-key cryptography?
A. rsa algorithm
B. diffie-hellman algorithm
C. electronic code book algorithm
D. none of the mentioned
Show Correct Answer
Correct Answer is :
electronic code book algorithm
9. In cryptography, the order of the letters in a message is rearranged by
A. transpositional ciphers
B. substitution ciphers
C. both transpositional ciphers and substitution ciphers
D. none of the mentioned
Show Correct Answer
Correct Answer is :
transpositional ciphers
10. What is data encryption standard (DES)?
A. block cipher
B. stream cipher
C. bit cipher
D. none of the mentioned
Show Correct Answer
Correct Answer is :
block cipher
11. Cryptanalysis is used
A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. none of the mentioned
Show Correct Answer
Correct Answer is :
to find some insecurity in a cryptographic scheme
12. Which one of the following is a cryptographic protocol used to secure HTTP connection?
A. stream control transmission protocol (SCTP)
B. transport layer security (TSL)
C. explicit congestion notification (ECN)
D. resource reservation protocol
Show Correct Answer
Correct Answer is :
transport layer security (TSL)
13. Voice privacy in GSM cellular telephone protocol is provided by
A. A5/2 cipher
B. b5/4 cipher
C. b5/6 cipher
D. b5/8 cipher
Show Correct Answer
Correct Answer is :
A5/2 cipher
14. ElGamal encryption system is
A. symmetric key encryption algorithm
B. asymmetric key encryption algorithm
C. not an encryption algorithm
D. none of the mentioned
Show Correct Answer
Correct Answer is :
asymmetric key encryption algorithm
15. Cryptographic hash function takes an arbitrary block of data and returns
A. fixed size bit string
B. variable size bit string
C. both fixed size bit string and variable size bit string
D. none of the mentioned
Show Correct Answer
Correct Answer is :
fixed size bit string
Similar Interview Questions
Search for latest jobs
Find Jobs