Top 150+ Solved Information and Network Security MCQ Questions Answer

From 31 to 45 of 106

Q. _________________ is the process or mechanism used for converting ordinary plaintext into garbled non-human readable text & vice-versa.

a. Malware Analysis

b. Exploit writing

c. Reverse engineering

d. Cryptography

  • d. Cryptography

Q. When plain text is converted to unreadable format, it is termed as _____________.

a. Rotten text

b. Raw text

c. Cipher-text

d. Cipher

  • c. Cipher-text

Q. Data which is easily readable & understandable without any special algorithm ormethod is called _________________.

a. Cipher-text

b. Plain text

c. Raw text

d. Encrypted text

  • b. Plain text

Q. Plain text are also called _____________.

a. Encrypted text

b. Clear-text

c. Raw text

d. Cipher-text

  • c. Raw text

Q. Conventional cryptography is also known as _____________ or symmetric-keyencryption.

a. Secret-key

b. Public key

c. Protected key

d. Primary key

  • a. Secret-key

Q. Data Encryption Standard is an example of a _____________ cryptosystem.

a. Conventional

b. Public key

c. Hash key

d. Asymmetric-key

  • a. Conventional

Q. _______ Cryptography deals with traditional characters, i.e., letters & digits directly.

a. Latest

b. Asymmetri

c. C Classic

d. Modern

  • c. C Classic

Q. ____________ Cryptography operates on binary-bit series and strings.

a. Modern

b. Classi

c. C Traditional

d. Primitive

  • a. Modern

Q. ____________ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text.

a. Polyalphabetic Cipher

b. Caesar Cipher

c. Playfair Cipher

d. Monoalphabetic Cipher

  • b. Caesar Cipher

Q. ______________ employs a text string as a key that is implemented to do a series ofshifts on the plain-text.

a. Shift Cipher

b. Block Cipher

c. Playfair Cipher

d. Vigenere Cipher

  • d. Vigenere Cipher
Subscribe Now

Get All Updates & News