• Tutorials
  • Courses
  • Tracks

Cyber Quiz 20

Last Updated :
Discuss
Comments

Question 1

Which of the following encryption algorithms is widely considered as the replacement for DES (Data Encryption Standard)?

  • AES (Advanced Encryption Standard)

  • RSA (Rivest–Shamir–Adleman)

  • Blowfish

  • 3DES (Triple DES)

Question 2

What is the primary difference between symmetric and asymmetric encryption?

  • Symmetric uses one key; asymmetric uses two different keys

  • Asymmetric uses one key; symmetric uses two different keys

  • Both use the same keys for encryption and decryption

  • Only asymmetric encryption needs key exchange

Question 3

Which of the following algorithms is used in asymmetric encryption for secure email communication?

  • MD5

  • AES

  • RSA

  • DES

Question 4

In RSA encryption, if p = 3 and q = 11, what is the value of n?

  • 21

  • 14

  • 30

  • 33

Question 5

Which hashing algorithm generates a 128-bit hash value?

  • SHA-1

  • SHA-256

  • MD5

  • SHA-512

Question 6

What is the key size used in AES-256 encryption?

  • 128 bytes

  • 256 bits

  • 64 bytes

  • 256 bytes

Question 7

Which cipher type involves shifting characters based on a fixed pattern?

  • Transposition Cipher

  • Substitution Cipher

  • Stream Cipher

  • Hash Function

Question 8

What is the base equation used in Elliptic Curve Cryptography (ECC)?

  • x² + y² = r²

  • y = mx + c

  • y³ = x³ + ax + b mod p

  • y² = x³ + ax + b mod p

Question 9

What is the Caesar Cipher output for the plaintext "Hello" with a shift of 3?

  • Khoor

  • Jgnnq

  • Lippw

  • Gdkkn

Question 10

What mechanism is used in asymmetric encryption for sender authentication?

  • Public Key Encryption

  • Session Key Exchange

  • Digital Signature

  • Hash Encryption

There are 10 questions to complete.

Take a part in the ongoing discussion