Top 150+ Solved Information and Network Security MCQ Questions Answer
Q. _________________ is the process or mechanism used for converting ordinary plaintext into garbled non-human readable text & vice-versa.
a. Malware Analysis
b. Exploit writing
c. Reverse engineering
d. Cryptography
Q. When plain text is converted to unreadable format, it is termed as _____________.
a. Rotten text
b. Raw text
c. Cipher-text
d. Cipher
Q. ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
a. Malware Analysis
b. Cryptography
c. Reverse engineering
d. Exploit writing
Q. Data which is easily readable & understandable without any special algorithm ormethod is called _________________.
a. Cipher-text
b. Plain text
c. Raw text
d. Encrypted text
Q. Plain text are also called _____________.
a. Encrypted text
b. Clear-text
c. Raw text
d. Cipher-text
Q. Conventional cryptography is also known as _____________ or symmetric-keyencryption.
a. Secret-key
b. Public key
c. Protected key
d. Primary key
Q. Data Encryption Standard is an example of a _____________ cryptosystem.
a. Conventional
b. Public key
c. Hash key
d. Asymmetric-key
Q. _______ Cryptography deals with traditional characters, i.e., letters & digits directly.
a. Latest
b. Asymmetri
c. C Classic
d. Modern
Q. ____________ Cryptography operates on binary-bit series and strings.
a. Modern
b. Classi
c. C Traditional
d. Primitive
Q. ____________ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text.
a. Polyalphabetic Cipher
b. Caesar Cipher
c. Playfair Cipher
d. Monoalphabetic Cipher
Q. ________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.
a. Rolling Cipher
b. Shift Cipher
c. Playfair Cipher
d. Block Cipher
Q. In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.
a. Rolling Cipher
b. Shift Cipher
c. Playfair Cipher
d. Block Cipher
Q. ______________ employs a text string as a key that is implemented to do a series ofshifts on the plain-text.
a. Shift Cipher
b. Block Cipher
c. Playfair Cipher
d. Vigenere Cipher