NSCT – Cryptography Basics MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Cryptography is the practice of: (A) Increasing internet speed (B) Deleting computer files (C) Hiding information by converting it into a secret form (D) Building computer hardwareShow All Answers 2. . The original readable message in cryptography is called: (A) Ciphertext (B) Secret code (C) Plaintext (D) Algorithm 3. . The encrypted form of a message is known as: (A) Plaintext (B) Ciphertext (C) Password (D) Protocol 4. . The process of converting plaintext into ciphertext is called: (A) Decryption (B) Compression (C) Encryption (D) Authentication 5. . The process of converting ciphertext back into plaintext is called: (A) Decryption (B) Encryption (C) Authentication (D) Verification 6. . A cryptographic key is: (A) A piece of information used to encrypt or decrypt data (B) A physical key for a computer (C) A network cable (D) A hardware device 7. . Which type of cryptography uses the same key for encryption and decryption? (A) Asymmetric cryptography (B) Symmetric cryptography (C) Public cryptography (D) Hash cryptography 8. . Which type of cryptography uses two different keys (public and private)? (A) Symmetric cryptography (B) Encoding (C) Hashing (D) Asymmetric cryptography 9. . The public key in cryptography is: (A) Kept secret by the owner (B) Deleted after use (C) Shared openly with others (D) Used only for storage 10. . The private key in cryptography is: (A) Shared with everyone (B) Stored on the internet (C) Kept secret by the owner (D) Used for printing 11. . Which of the following is an example of a symmetric encryption algorithm? (A) AES (B) RSA (C) DSA (D) ECC 12. . Which of the following is an example of an asymmetric encryption algorithm? (A) RSA (B) AES (C) DES (D) MD5 13. . Hashing is used to: (A) Copy files (B) Increase storage space (C) Convert data into a fixed-length value (D) Delete data 14. . Which of the following is a hashing algorithm? (A) DES (B) AES (C) RSA (D) SHA-256 15. . Digital signatures are used to ensure: (A) Faster internet (B) Large storage space (C) Data authenticity and integrity (D) Data deletion 16. . A brute force attack is: (A) Increasing security (B) Deleting files quickly (C) Guessing passwords by trying many combinations (D) Sending emails 17. . Which cryptographic technique ensures that data has not been altered? (A) Hashing (B) Printing (C) Scanning (D) Downloading 18. . Cryptography mainly helps in providing: (A) Entertainment (B) Hardware repair (C) Internet speed (D) Data security and privacy 19. . Which of the following is used to secure online communication? (A) HTML (B) SSL/TLS (C) CSS (D) MS Word 20. . The main purpose of cryptography is to: (A) Build hardware devices (B) Increase computer size (C) Delete files automatically (D) Hide and protect information