Q1. Cryptographic algorithms would include all of the these except?
- Data Encryption Standard
- Advanced Encryption Standard
- Transport Layer Security
- Message Digest Algorithm
Q2. Which one of the following is called a crypto variable?
- Plain Text
- Cipher Text
- Cipher
- Cryptographic Key
Q3. Identify the best explanation from the following for a digital signature?
- Applying senders private key to the message
- Applying senders public key to the message
- Applying receivers private key to the message
- Applying receivers public key to the message
Q4. When a specific key is authorized for use by legitimate entities, and that usage is based on time, it is known as what?
- Cryptanalysis
- Cryptography
- Crypto period
- Key usage
Q5. Which one of the following is a type of cryptanalytic attack?
- Chosen image
- Chosen plaintext
- Adaptive image parameter
- Adaptive plain-cipher text
Q6. Which one of the following is an application of IPSec?
- Wireless Application Protocol
- Virtual Private Networking
- S/MIME
- Social engineering
Q7. An image file downloaded from the Internet conceals a secret code. Such a method of concealing information is known as what?
- Message hiding
- Message docking
- Steganography
- Watermarking
Q8. A birthday attack is a cryptographic attack and is used to guess a random input data. Which one of the following mathematical probability theories provides basis for such an attack?
- There is a chance that more than 50% of randomly chosen people in a group of 23 may have the same birthday
- There is a chance that less than 50% of randomly chosen people in a group of 23 may have the same birthday
- There is a chance that 50% of randomly chosen people in a group of 23 may have the same birthday
- There is a chance that more than 80% of randomly chosen people in a group of 23 may have the same birthday
Q9. Which of the following encryption standards is proposed as an official successor of the Data Encryption Standard (DES)?
- Triple-DES
- Advance Encryption Standard (AES)
- Blowfish
- Twofish
Q10. Which of the following choices are true statements pertaining to cryptographic algorithms?