Question 1
Which of the following encryption algorithms is widely considered as the replacement for DES (Data Encryption Standard)?
AES (Advanced Encryption Standard)
RSA (Rivest–Shamir–Adleman)
Blowfish
3DES (Triple DES)
Question 2
What is the primary difference between symmetric and asymmetric encryption?
Symmetric uses one key; asymmetric uses two different keys
Asymmetric uses one key; symmetric uses two different keys
Both use the same keys for encryption and decryption
Only asymmetric encryption needs key exchange
Question 3
Which of the following algorithms is used in asymmetric encryption for secure email communication?
MD5
AES
RSA
DES
Question 6
What is the key size used in AES-256 encryption?
128 bytes
256 bits
64 bytes
256 bytes
Question 7
Which cipher type involves shifting characters based on a fixed pattern?
Transposition Cipher
Substitution Cipher
Stream Cipher
Hash Function
Question 8
What is the base equation used in Elliptic Curve Cryptography (ECC)?
x² + y² = r²
y = mx + c
y³ = x³ + ax + b mod p
y² = x³ + ax + b mod p
Question 9
What is the Caesar Cipher output for the plaintext "Hello" with a shift of 3?
Khoor
Jgnnq
Lippw
Gdkkn
Question 10
What mechanism is used in asymmetric encryption for sender authentication?
Public Key Encryption
Session Key Exchange
Digital Signature
Hash Encryption
There are 10 questions to complete.