T4Tutorials .PK

Digital Signatures and Cryptography

1. : What does cryptography mainly deal with?

(A) Data storage


(B) Securing communication through encryption and decryption


(C) Cloud hosting


(D) Database design




2. : A digital signature is used to ensure:

(A) Confidentiality only


(B) Authentication and integrity of digital data


(C) File compression


(D) High internet speed




3. : In asymmetric cryptography, how many keys are used?

(A) One key


(B) Two keys (public and private)


(C) Three keys


(D) No keys




4. : Which of the following is a symmetric key algorithm?

(A) AES


(B) RSA


(C) ECC


(D) Diffie-Hellman




5. : Which of the following is a hash function used in cryptography?

(A) DES


(B) SHA-256


(C) RSA


(D) AES




6. : What does a digital signature prevent?

(A) Unauthorized system login


(B) Forgery or tampering of digital documents


(C) Loss of internet connection


(D) Data compression errors




7. : Which of the following ensures confidentiality of data?

(A) Encryption


(B) Hashing


(C) Digital signatures


(D) Compression




8. : In digital signatures, which key is used to verify the signature?

(A) Private key


(B) Public key


(C) Same key as encryption


(D) Secret key only




9. : What is the main disadvantage of symmetric key cryptography?

(A) Slow performance


(B) Difficulty in securely sharing the secret key


(C) Low accuracy in encryption


(D) High cost of implementation




10. : Which act in Pakistan legally recognizes digital signatures?

(A) PECA 2016


(B) Electronic Transactions Ordinance 2002


(C) Right to Information Act 2017


(D) Cyber Security Act 2018




Exit mobile version