1. . Cryptography is the practice of:
(A) Increasing internet speed
(B) Deleting computer files
(C) Hiding information by converting it into a secret form
(D) Building computer hardware
2. . The original readable message in cryptography is called:
(A) Ciphertext
(B) Secret code
(C) Plaintext
(D) Algorithm
3. . The encrypted form of a message is known as:
(A) Plaintext
(B) Ciphertext
(C) Password
(D) Protocol
4. . The process of converting plaintext into ciphertext is called:
(A) Decryption
(B) Compression
(C) Encryption
(D) Authentication
5. . The process of converting ciphertext back into plaintext is called:
(A) Decryption
(B) Encryption
(C) Authentication
(D) Verification
6. . A cryptographic key is:
(A) A piece of information used to encrypt or decrypt data
(B) A physical key for a computer
(C) A network cable
(D) A hardware device
7. . Which type of cryptography uses the same key for encryption and decryption?
(A) Asymmetric cryptography
(B) Symmetric cryptography
(C) Public cryptography
(D) Hash cryptography
8. . Which type of cryptography uses two different keys (public and private)?
(A) Symmetric cryptography
(B) Encoding
(C) Hashing
(D) Asymmetric cryptography
9. . The public key in cryptography is:
(A) Kept secret by the owner
(B) Deleted after use
(C) Shared openly with others
(D) Used only for storage
10. . The private key in cryptography is:
(A) Shared with everyone
(B) Stored on the internet
(C) Kept secret by the owner
(D) Used for printing
11. . Which of the following is an example of a symmetric encryption algorithm?
(A) AES
(B) RSA
(C) DSA
(D) ECC
12. . Which of the following is an example of an asymmetric encryption algorithm?
(A) RSA
(B) AES
(C) DES
(D) MD5
13. . Hashing is used to:
(A) Copy files
(B) Increase storage space
(C) Convert data into a fixed-length value
(D) Delete data
14. . Which of the following is a hashing algorithm?
(A) DES
(B) AES
(C) RSA
(D) SHA-256
15. . Digital signatures are used to ensure:
(A) Faster internet
(B) Large storage space
(C) Data authenticity and integrity
(D) Data deletion
16. . A brute force attack is:
(A) Increasing security
(B) Deleting files quickly
(C) Guessing passwords by trying many combinations
(D) Sending emails
17. . Which cryptographic technique ensures that data has not been altered?
(A) Hashing
(B) Printing
(C) Scanning
(D) Downloading
18. . Cryptography mainly helps in providing:
(A) Entertainment
(B) Hardware repair
(C) Internet speed
(D) Data security and privacy
19. . Which of the following is used to secure online communication?
(A) HTML
(B) SSL/TLS
(C) CSS
(D) MS Word
20. . The main purpose of cryptography is to:
(A) Build hardware devices
(B) Increase computer size
(C) Delete files automatically
(D) Hide and protect information