NSCT – Cryptography Basics MCQs 20 min Score: 0 Attempted: 0/20 Subscribe 1. . Cryptography is the practice of: (A) Increasing internet speed (B) Deleting computer files (C) Hiding information by converting it into a secret form (D) Building computer hardwareShow All AnswersShow All Answers 2. . The original readable message in cryptography is called: (A) Ciphertext (B) Secret code (C) Plaintext (D) AlgorithmShow All Answers 3. . The encrypted form of a message is known as: (A) Plaintext (B) Ciphertext (C) Password (D) ProtocolShow All Answers 4. . The process of converting plaintext into ciphertext is called: (A) Decryption (B) Compression (C) Encryption (D) AuthenticationShow All Answers 5. . The process of converting ciphertext back into plaintext is called: (A) Decryption (B) Encryption (C) Authentication (D) VerificationShow All Answers 6. . A cryptographic key is: (A) A piece of information used to encrypt or decrypt data (B) A physical key for a computer (C) A network cable (D) A hardware deviceShow All Answers 7. . Which type of cryptography uses the same key for encryption and decryption? (A) Asymmetric cryptography (B) Symmetric cryptography (C) Public cryptography (D) Hash cryptographyShow All Answers 8. . Which type of cryptography uses two different keys (public and private)? (A) Symmetric cryptography (B) Encoding (C) Hashing (D) Asymmetric cryptographyShow All Answers 9. . The public key in cryptography is: (A) Kept secret by the owner (B) Deleted after use (C) Shared openly with others (D) Used only for storageShow All Answers 10. . The private key in cryptography is: (A) Shared with everyone (B) Stored on the internet (C) Kept secret by the owner (D) Used for printingShow All Answers 11. . Which of the following is an example of a symmetric encryption algorithm? (A) AES (B) RSA (C) DSA (D) ECCShow All Answers 12. . Which of the following is an example of an asymmetric encryption algorithm? (A) RSA (B) AES (C) DES (D) MD5Show All Answers 13. . Hashing is used to: (A) Copy files (B) Increase storage space (C) Convert data into a fixed-length value (D) Delete dataShow All Answers 14. . Which of the following is a hashing algorithm? (A) DES (B) AES (C) RSA (D) SHA-256Show All Answers 15. . Digital signatures are used to ensure: (A) Faster internet (B) Large storage space (C) Data authenticity and integrity (D) Data deletionShow All Answers 16. . A brute force attack is: (A) Increasing security (B) Deleting files quickly (C) Guessing passwords by trying many combinations (D) Sending emailsShow All Answers 17. . Which cryptographic technique ensures that data has not been altered? (A) Hashing (B) Printing (C) Scanning (D) DownloadingShow All Answers 18. . Cryptography mainly helps in providing: (A) Entertainment (B) Hardware repair (C) Internet speed (D) Data security and privacyShow All Answers 19. . Which of the following is used to secure online communication? (A) HTML (B) SSL/TLS (C) CSS (D) MS WordShow All Answers 20. . The main purpose of cryptography is to: (A) Build hardware devices (B) Increase computer size (C) Delete files automatically (D) Hide and protect informationShow All Answers