Cryptography in Security: Study of Secure Communication Techniques

This is a computer science engineering quiz on cybersecurity, which includes questions on cryptography, types of cryptography, etc.

download.png
Start Quiz

Cryptography can be divided into ______ types.

5 4 3 2

There are ________ types of cryptographic techniques used in general.

2 3 4 5

____________ cryptography operates on binary-bit series and strings.

Modern Classic Traditional Primitive

__________ cryptography has always been focussing on the concept of ‘security through obscurity’.

Modern Asymmetric Classic Latest

________________ cryptography is based on publicly known mathematically designed algorithms to encrypt the information.

Modern Classic Traditional Primitive

_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text and vice-versa.

Malware Analysis

Exploit writing

Reverse engineering

Cryptography

When plain text is converted to unreadable format, it is termed as _____________

Rotten text

Raw text

Cipher-text

Ciphen-text

Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.

Secret key

External programs

Add-ons

Secondary key

Data which is easily readable & understandable without any special algorithm or method is called _________________

Cipher-text

Plain text

Raw text

Encrypted text

Plain text are also called _____________

Cipher-text

Raw text

Clear-text

Encrypted text

Data Encryption Standard is an example of a _____________ cryptosystem.

Conventional

Public key

Hash key

Asymmetric-key

_______________ cryptography deals with traditional characters, i.e., letters and digits directly.

Modern

Classic

Asymmetric

Latest

Quiz/Test Summary
Title: Cryptography in Security: Study of Secure Communication Techniques
Questions: 12
Contributed by:
james