Public Key Cryptography Interview Questions | Snaprecruit.com
Public Key Cryptography Interview Questions | Snaprecruit.com
JOBSEEKERS
Login
Sign Up
Jobseeker
Employer
Staffing
Enterprises
Public Key Cryptography interview questions
Public Key Cryptography interview questions
Back
Take as many assements as you can to improve your validate your skill rating
Total Questions: 10
1. Public key encryption/decryption is not preferred because
A. it is slow
B. it is hardware/software intensive
C. it has a high computational load
D. all of the mentioned
Show Correct Answer
Correct Answer is :
all of the mentioned
2. Which one of the following is not a public key distribution means?
A. Public-Key Certificates
B. Hashing Certificates
C. Publicly available directories
D. Public-Key authority
Show Correct Answer
Correct Answer is :
Hashing Certificates
3. What is the PGP stand for?
A. Permuted Gap Permission
B. Permuted Great Privacy
C. Pretty Good Permission
D. None of the mentioned
Show Correct Answer
Correct Answer is :
None of the mentioned
4. PGP makes use of which cryptographic algorithm?
A. DES
B. AES
C. RSA
D. Rabin
Show Correct Answer
Correct Answer is :
RSA
5. USENET is related to which of the following Public Key distribution schemes?
A. Public-Key Certificates
B. Public announcements
C. Publicly available directories
D. Public-Key authority
Show Correct Answer
Correct Answer is :
Public announcements
6. Which of the following public key distribution systems is most secure?
A. Public-Key Certificates
B. Public announcements
C. Publicly available directories
D. Public-Key authority
Show Correct Answer
Correct Answer is :
Public-Key Certificates
7. Which systems use a timestamp? i) Public-Key Certificates ii) Public announcements iii) Publicly available directories iv) Public-Key authority
A. i) and ii)
B. iii) and iv)
C. i) and iv)
D. iv) only
Show Correct Answer
Correct Answer is :
i) and iv)
8. Which of these systems use timestamps as an expiration date?
A. Public-Key Certificates
B. Public announcements
C. Publicly available directories
D. Public-Key authority
Show Correct Answer
Correct Answer is :
Public-Key Certificates
9. Which system uses a trusted third party interface?
A. Public-Key Certificates
B. Public announcements
C. Publicly available directories
D. Public-Key authority
Show Correct Answer
Correct Answer is :
Public-Key Certificates
10. Publicly Available directory is more secure than which other system?
A. Public-Key Certificates
B. Public announcements
C. Public-Key authority
D. None of the mentioned
Show Correct Answer
Correct Answer is :
Public announcements
Similar Interview Questions
Search for latest jobs
Find Jobs