T4Tutorials .PK

NSCT – Cryptography Basics MCQs

1. . Cryptography is the practice of:

(A) Increasing internet speed


(B) Deleting computer files


(C) Hiding information by converting it into a secret form


(D) Building computer hardware




2. . The original readable message in cryptography is called:

(A) Ciphertext


(B) Secret code


(C) Plaintext


(D) Algorithm




3. . The encrypted form of a message is known as:

(A) Plaintext


(B) Ciphertext


(C) Password


(D) Protocol




4. . The process of converting plaintext into ciphertext is called:

(A) Decryption


(B) Compression


(C) Encryption


(D) Authentication




5. . The process of converting ciphertext back into plaintext is called:

(A) Decryption


(B) Encryption


(C) Authentication


(D) Verification




6. . A cryptographic key is:

(A) A piece of information used to encrypt or decrypt data


(B) A physical key for a computer


(C) A network cable


(D) A hardware device




7. . Which type of cryptography uses the same key for encryption and decryption?

(A) Asymmetric cryptography


(B) Symmetric cryptography


(C) Public cryptography


(D) Hash cryptography




8. . Which type of cryptography uses two different keys (public and private)?

(A) Symmetric cryptography


(B) Encoding


(C) Hashing


(D) Asymmetric cryptography




9. . The public key in cryptography is:

(A) Kept secret by the owner


(B) Deleted after use


(C) Shared openly with others


(D) Used only for storage




10. . The private key in cryptography is:

(A) Shared with everyone


(B) Stored on the internet


(C) Kept secret by the owner


(D) Used for printing




11. . Which of the following is an example of a symmetric encryption algorithm?

(A) AES


(B) RSA


(C) DSA


(D) ECC




12. . Which of the following is an example of an asymmetric encryption algorithm?

(A) RSA


(B) AES


(C) DES


(D) MD5




13. . Hashing is used to:

(A) Copy files


(B) Increase storage space


(C) Convert data into a fixed-length value


(D) Delete data




14. . Which of the following is a hashing algorithm?

(A) DES


(B) AES


(C) RSA


(D) SHA-256




15. . Digital signatures are used to ensure:

(A) Faster internet


(B) Large storage space


(C) Data authenticity and integrity


(D) Data deletion




16. . A brute force attack is:

(A) Increasing security


(B) Deleting files quickly


(C) Guessing passwords by trying many combinations


(D) Sending emails




17. . Which cryptographic technique ensures that data has not been altered?

(A) Hashing


(B) Printing


(C) Scanning


(D) Downloading




18. . Cryptography mainly helps in providing:

(A) Entertainment


(B) Hardware repair


(C) Internet speed


(D) Data security and privacy




19. . Which of the following is used to secure online communication?

(A) HTML


(B) SSL/TLS


(C) CSS


(D) MS Word




20. . The main purpose of cryptography is to:

(A) Build hardware devices


(B) Increase computer size


(C) Delete files automatically


(D) Hide and protect information




Exit mobile version