Question 1: What is a hash function?
A. An encryption algorithm used to secure information
B. A mathematical algorithm that generates a summary or hash value of a
message
C. A data compression method to reduce file size
D. A technique to encrypt messages using a secret key
Question 2: What modern cryptographic method is used to confirm the identity of
a specific message and ensure that its contents have not changed?
A. Symmetric encryption
B. Hash function
C. Digital signature
D. Steganography
Question 3: What is a fingerprint of the author’s message that is compared with
the recipient’s locally calculated hash of the same message?
A. Encryption key
B. Digital signature
C. Message digest
D. Hash functions
Question 4: What does SHS stand for in cryptography?
A. Secure Hash Standard
B. Symmetric Hashing System
C. Secure Hacking Solution
D. Standard Hashing Structure
Question 5: How many main properties does an ideal cryptographic hash function
have?
A. 1
B. 2
C. 3
D. 4
Question 6: How many keys does Symmetric Encryption require? What is it
called?
A. One key, called a private key
B. One key, called a secret key
C. Two keys, called a public and private key
D. Two keys, both called secret keys
Question 7: What is called symmetric encryption?
A. An encryption method that uses the same secret key for both encryption
and decryption.
B. An encryption method that uses a pair of public and private keys.
C. A technique that converts plaintext into an irreversible hash value.
D. A method that does not require a key for encryption or decryption.
Question 8: What are some popular symmetric encryption cryptosystems?
A. RSA, ECC, Diffie-Hellman
B. DES, 3DES, AES
C. SHA-256, MD5, HMAC
D. PGP, DSA, ElGamal
Question 9: What is the primary challenge of symmetric key encryption?
A. The encryption and decryption process is too slow.
B. It is not used in modern cryptographic systems.
C. It requires two different keys for encryption and decryption.
D. Securely sharing the secret key between sender and receiver.
Question 10: What is the difference between DES and AES?
A. DES uses a longer key length than AES.
B. DES is the successor of AES and provides stronger encryption.
C. AES is more secure and supports larger key sizes than DES.
D. AES and DES use the same key size and encryption process.
Question 11: What is the difference between symmetric and asymmetric
encryption?
A. Asymmetric encryption uses two different related keys, while symmetric
encryption uses a single key for both encryption and decryption.
B. Asymmetric encryption is more efficient in terms of CPU computations
compared to symmetric encryption.
C. Asymmetric encryption requires only one key pair for secure communication,
while symmetric encryption requires multiple key pairs.
D. Asymmetric encryption is primarily used for securing databases, while
symmetric encryption is used for digital signatures.
Question 12: What is a secret mechanism that enables you to easily accomplish
the reverse function in a one-way function?
A. Public key
B. Hash function
C. Mathematical Trapdoor
D. Digital signature
Question 13: What asymmetric encryption cryptosystem is one of the most
popular public key cryptosystems?
A. RSA (Rivest-Shamir-Adleman)
B. ECC (Elliptic Curve Cryptography)
C. DSA (Digital Signature Algorithm)
D. Diffie-Hellman
Question 14: Asymmetric algorithms are …?
A. One-way functions
B. Multi-way functions
C. Two-way functions
D. Reversible functions
Question 15: What is public-key encryption based?
A. Symmetric key encryption
B. Hash value
C. Shared secret keys
D. Hash functions