Options:
(A) Encrypt data
(B) Find key relationships
(C) Compress data
(D) Route packets
Correct Answer: (B) Find key relationships
Question: Modular inverse is essential for:
Options:
(A) Decryption process
(B) Routing tables
(C) Hashing only
(D) Data storage
Correct Answer: (A) Decryption process
Question: Euler's totient function helps in:
Options:
(A) Addressing
(B) Key generation
(C) Data transfer
(D) Routing
Correct Answer: (B) Key generation
Question: Fermat's theorem contributes to:
Options:
(A) Network speed
(B) Cryptographic hardness
(C) Storage efficiency
(D) Compression
Correct Answer: (B) Cryptographic hardness
Question: Computational complexity resists:
Options:
(A) Routing loops
(B) Brute-force attacks
(C) Packet loss
(D) Latency
Correct Answer: (B) Brute-force attacks
Question: Exponentiation is heavily used in:
Options:
(A) Symmetric encryption
(B) Asymmetric encryption
(C) Routing
(D) Switching
Correct Answer: (B) Asymmetric encryption
Question: Cryptographic strength depends on:
Options:
(A) Key secrecy only
(B) Mathematical difficulty
(C) Bandwidth
(D) CPU speed
Correct Answer: (B) Mathematical difficulty
Question: Modular reduction prevents:
Options:
(A) Overflow
(B) Encryption
(C) Hashing
(D) Routing
Correct Answer: (A) Overflow
Question: Public key systems rely on:
Options:
(A) Simple arithmetic
(B) Complex number theory
(C) Analog math
(D) Linear algebra only
Correct Answer: (B) Complex number theory
Question: Arithmetic operations in cryptography are:
Options:
(A) Random
(B) Deterministic
(C) Analog
(D) Approximate
Correct Answer: (B) Deterministic
Question: Which is NOT an encryption arithmetic operation?
Options:
(A) Modular multiplication
(B) XOR
(C) Routing update
(D) Exponentiation
Correct Answer: (C) Routing update
Question: One-way functions are important because they are:
Options:
(A) Easily reversible
(B) Hard to invert
(C) Random
(D) Inefficient
Correct Answer: (B) Hard to invert
Question: Cryptanalysis targets:
Options:
(A) Arithmetic weakness
(B) Routing tables
(C) Network speed
(D) Storage
Correct Answer: (A) Arithmetic weakness
Question: Encryption arithmetic operates under:
Options:
(A) Open sets
(B) Finite fields
(C) Infinite sets
(D) Analog values
Correct Answer: (B) Finite fields
Question: Which math concept ensures uniqueness in keys?
Options:
(A) Hashing
(B) Prime factorization
(C) Compression
(D) Switching
Correct Answer: (B) Prime factorization
Question: Public key encryption relies on difficulty of:
Options:
(A) Sorting
(B) Factoring large numbers
(C) Addition
(D) Subtraction
Correct Answer: (B) Factoring large numbers
Question: Arithmetic complexity increases with:
Options:
(A) Smaller keys
(B) Larger key sizes
(C) Lower bandwidth
(D) Fewer users
Correct Answer: (B) Larger key sizes
Question: Symmetric encryption uses:
Options:
(A) Two unrelated keys
(B) One shared secret key
(C) Public key only
(D) Digital certificates
Correct Answer: (B) One shared secret key
Question: Symmetric algorithms are known for:
Options:
(A) High computational cost
(B) Efficiency and speed
(C) Key exchange complexity
(D) Non-repudiation
Correct Answer: (B) Efficiency and speed
Question: AES is preferred because it is:
Options:
(A) Slow
(B) Strong and efficient
(C) Obsolete
(D) Hardware-only
Correct Answer: (B) Strong and efficient
Question: DES is considered insecure due to:
Options:
(A) Large key size
(B) Small key size
(C) High speed
(D) Public key usage
Correct Answer: (B) Small key size
Question: Blowfish is a:
Options:
(A) Stream cipher
(B) Block cipher
(C) Hash function
(D) Routing protocol
Correct Answer: (B) Block cipher
0 comments:
Post a Comment