Multiple-choice questions (MCQs) on Network Cryptography

1. What is the primary purpose of encryption?

a) To protect data from unauthorized access
b) To reduce data size
c) To make data readable by anyone
d) To store data securely

Answer: a) To protect data from unauthorized access


2. Which type of key is used in symmetric encryption?

a) Public key
b) Private key
c) Shared secret key
d) Session key

Answer: c) Shared secret key


3. What does decryption do to the encrypted data?

a) Encrypts the data again
b) Converts the encrypted data back to its original form
c) Transforms the data into a cipher text
d) Changes the key used in encryption

Answer: b) Converts the encrypted data back to its original form


4. In asymmetric encryption, which key is used for encryption?

a) Private key
b) Public key
c) Shared key
d) Session key

Answer: b) Public key


5. Which key is used to decrypt the data in asymmetric encryption?

a) Public key
b) Private key
c) Session key
d) Shared secret key

Answer: b) Private key


6. What is the main characteristic of public-key cryptography?

a) Both encryption and decryption use the same key
b) One key is used for encryption and a different one for decryption
c) It does not use any key
d) It relies on password-based authentication

Answer: b) One key is used for encryption and a different one for decryption


7. What is a benefit of using public-key encryption?

a) It requires less computational power
b) It simplifies key management and distribution
c) It is slower than symmetric encryption
d) It doesn’t require a key for decryption

Answer: b) It simplifies key management and distribution


8. What is the function of the private key in public-key cryptography?

a) It is used to encrypt data
b) It is used to decrypt data
c) It is used to hash data
d) It is used to generate the session key

Answer: b) It is used to decrypt data


9. Which of the following is a commonly used public-key algorithm?

a) DES
b) RSA
c) AES
d) Blowfish

Answer: b) RSA


10. In the RSA algorithm, which key is used to sign a message?

a) Public key
b) Private key
c) Session key
d) Shared key

Answer: b) Private key


11. What is the output of encryption in the encryption/decryption process?

a) Plaintext
b) Key
c) Ciphertext
d) Hash value

Answer: c) Ciphertext


12. Which of the following is true about symmetric encryption?

a) It uses a public and a private key
b) It is slower than asymmetric encryption
c) It uses the same key for both encryption and decryption
d) It requires complex key management

Answer: c) It uses the same key for both encryption and decryption


13. What does a digital signature verify in an encrypted message?

a) The integrity of the message
b) The encryption method used
c) The public key of the receiver
d) The message size

Answer: a) The integrity of the message


14. Which of the following is NOT an advantage of asymmetric encryption?

a) Public and private keys do not need to be shared securely
b) It offers stronger security than symmetric encryption
c) It requires less computational power than symmetric encryption
d) It simplifies key distribution

Answer: c) It requires less computational power than symmetric encryption


15. In which of the following encryption systems is the same key used for both encryption and decryption?

a) Public key cryptography
b) Symmetric key cryptography
c) Hashing
d) Digital signatures

Answer: b) Symmetric key cryptography


16. Which protocol uses public and private keys to secure communication over the internet?

a) HTTP
b) SSL/TLS
c) FTP
d) SMTP

Answer: b) SSL/TLS


17. What is the process of converting plaintext into ciphertext called?

a) Decryption
b) Encoding
c) Encryption
d) Hashing

Answer: c) Encryption


18. In public-key cryptography, which key is shared with others for encryption?

a) Private key
b) Public key
c) Session key
d) Secret key

Answer: b) Public key


19. What is the primary purpose of a certificate authority (CA) in public-key cryptography?

a) To generate encryption keys
b) To verify the authenticity of public keys
c) To store the private keys of users
d) To hash data

Answer: b) To verify the authenticity of public keys


20. Which of the following statements is true about public key cryptography?

a) The private key is shared openly
b) Only the public key is used for encryption
c) The same key is used for encryption and decryption
d) Public key cryptography is only used for hashing

Answer: b) Only the public key is used for encryption


21. What type of encryption is typically used to secure wireless networks?

a) Symmetric encryption
b) Asymmetric encryption
c) AES (Advanced Encryption Standard)
d) RSA encryption

Answer: a) Symmetric encryption


22. In a public-key encryption system, who holds the private key?

a) Everyone
b) The sender
c) The receiver
d) The certificate authority

Answer: c) The receiver


23. What is the primary purpose of using a session key in encryption?

a) To store the private key securely
b) To sign the message
c) To encrypt the message securely for the session
d) To hash the message

Answer: c) To encrypt the message securely for the session


24. What is used to generate a public and private key pair?

a) Symmetric encryption algorithm
b) Asymmetric encryption algorithm
c) Hashing algorithm
d) Digital signature algorithm

Answer: b) Asymmetric encryption algorithm


25. Which of the following is an example of asymmetric encryption?

a) RSA
b) AES
c) DES
d) RC4

Answer: a) RSA


26. How does public-key cryptography ensure security?

a) By using the same key for encryption and decryption
b) By using a pair of keys—one for encryption and one for decryption
c) By using a single key for all users
d) By hashing data

Answer: b) By using a pair of keys—one for encryption and one for decryption


27. What happens if the public key is compromised in a public-key cryptography system?

a) The entire system becomes insecure
b) The private key becomes ineffective
c) The encryption process is slowed down
d) Nothing happens, as public keys are not secret

Answer: d) Nothing happens, as public keys are not secret


28. In which situation is asymmetric encryption most commonly used?

a) For encrypting large amounts of data
b) For encrypting communication between two parties without prior key exchange
c) For encrypting files locally
d) For fast and efficient encryption of data

Answer: b) For encrypting communication between two parties without prior key exchange


29. What is a certificate authority (CA) used for in public-key infrastructure (PKI)?

a) To create and manage encryption keys
b) To generate session keys
c) To issue and validate digital certificates
d) To encrypt messages

Answer: c) To issue and validate digital certificates


30. Which of the following algorithms is typically used for symmetric encryption?

a) RSA
b) AES
c) Diffie-Hellman
d) ECC

Answer: b) AES

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *