Vous êtes sur la page 1sur 4

A Complete Chapter Quiz

Cryptography

Compilation of all the quizzes (MCQs) for each and every chapters in the book of Data
Communications and Networking 4th Edition by Behrouz A. Forouzan.

1|P age
MCQs in Cryptography
www.PinoyBIX.com
1. One commonly used public-key C) T-box
cryptography method is the ______ D) none of the above
algorithm. 7. A ________ cipher replaces one
A) RSS character with another character.
B) RAS A) substitution
C) RSA B) transposition
D) RAA C) either (a) or (b)
2. A(n) ______ algorithm transforms D) neither (a) nor (b)
ciphertext to plaintext. 8. The ________ cipher reorders the
A) encryption plaintext characters to create a
B) decryption ciphertext.
C) either (a) or (b) A) substitution
D) neither (a) nor (b) B) transposition
3. The ________ is the message after C) either (a) or (b)
transformation. D) neither (a) nor (b)
A) ciphertext 9. _______ is a round cipher based on
B) plaintext the Rijndael algorithm that uses a 128-bit
C) secret-text block of data.
D) none of the above A) AEE
4. A(n) _______ algorithm transforms B) AED
plaintext to ciphertext. C) AER
A) encryption D) AES
B) decryption 10. The ________is the original message
C) either (a) or (b) before transformation.
D) neither (a) nor (b) A) ciphertext
5. The ________ method provides a one- B) plaintext
time session key for two parties. C) secret-text
A) Diffie-Hellman D) none of the above
B) RSA 11. A modern cipher is usually a complex
C) DES _____cipher made of a combination of
D) AES different simple ciphers.
6. A(n) ______ is a keyless substitution A) round
cipher with N inputs and M outputs that B) circle
uses a formula to define the relationship C) square
between the input stream and the output D) none of the above
stream. 12. The _________ attack can endanger
A) S-box the security of the Diffie-Hellman method
B) P-box

2|P age
MCQs in Cryptography
www.PinoyBIX.com
if two parties are not authenticated to 18. The Caesar cipher is a
each other. _______cipher that has a key of 3.
A) man-in-the-middle A) transposition
B) ciphertext attack B) additive
C) plaintext attack C) shift
D) none of the above D) none of the above
13. A combination of an encryption 19. ECB and CBC are ________ ciphers.
algorithm and a decryption algorithm is A) block
called a ________. B) stream
A) cipher C) field
B) secret D) none of the above
C) key 20. A(n) _______is a keyless
D) none of the above transposition cipher with N inputs and M
14. In an asymmetric-key cipher, the outputs that uses a table to define the
receiver uses the ______ key. relationship between the input stream
A) private and the output stream.
B) public A) S-box
C) either a or b B) P-box
D) neither (a) nor (b) C) T-box
15. AES has _____ different D) none of the above
configurations. 21. ________ DES was designed to
A) two increase the size of the DES key.
B) three A) Double
C) four B) Triple
D) five C) Quadruple
16. DES is a(n) ________ method D) none of the above
adopted by the U.S. government. 22. ________ is the science and art of
A) symmetric-key transforming messages to make them
B) asymmetric-key secure and immune to attacks.
C) either (a) or (b) A) Cryptography
D) neither (a) nor (b) B) Cryptoanalysis
17. DES uses a key generator to C) either (a) or (b)
generate sixteen _______ round keys. D) neither (a) nor (b)
A) 32-bit 23. DES has an initial and final
B) 48-bit permutation block and _________
C) 54-bit rounds.
D) 42-bit A) 14
B) 15

3|P age
MCQs in Cryptography
www.PinoyBIX.com
C) 16 B) asymmetric-key
D) none of the above C) either (a) or (b)
24. The DES function has _______ D) neither (a) nor (b)
components. 30. The _______ is a number or a set of
A) 2 numbers on which the cipher operates.
B) 3 A) cipher
C) 4 B) secret
D) 5 C) key
25. In a(n) ________ cipher, the same D) none of the above
key is used by both the sender and 31. In a(n) ________, the key is called
receiver. the secret key.
A) symmetric-key A) symmetric-key
B) asymmetric-key B) asymmetric-key
C) either (a) or (b) C) either (a) or (b)
D) neither (a) nor (b) D) neither (a) nor (b)
26. _________ ciphers can be
categorized into two broad categories:
monoalphabetic and polyalphabetic.
A) Substitution
B) Transposition
C) either (a) or (b)
D) neither (a) nor (b)
27. The _______ cipher is the simplest
monoalphabetic cipher. It uses modular
arithmetic with a modulus of 26.
A) transposition
B) additive
C) shift
D) none of the above
28. In an asymmetric-key cipher, the
sender uses the__________ key.
A) private
B) public
C) either (a) or (b)
D) neither (a) nor (b)
29. In a(n) ________ cipher, a pair of
keys is used.
A) symmetric-key

4|P age
MCQs in Cryptography
www.PinoyBIX.com

Vous aimerez peut-être aussi