System Administrator 2026
In cryptography, what is cipher?
  • A. Algorithm for performing encryption and decryption
  • B. Encrypted message
  • C. Both algorithm for performing encryption and decryption and encrypted message
  • D. Decrypted message
In asymmetric key cryptography, the private key is kept by __________
  • A. Sender
  • B. Receiver
  • C. Sender and receiver
  • D. All the connected devices to the network
Which one of the following algorithm is not used in asymmetric-key cryptography?
  • A. Rsa algorithm
  • B. Diffie-hellman algorithm
  • C. Electronic code book algorithm
  • D. Dsa algorithm
In cryptography, the order of the letters in a message is rearranged by __________
  • A. Transpositional ciphers
  • B. Substitution ciphers
  • C. Both transpositional ciphers and substitution ciphers
  • D. Quadratic ciphers
What is data encryption standard (DES)?
  • A. Block cipher
  • B. Stream cipher
  • C. Bit cipher
  • D. Byte cipher
Cryptanalysis is used __________
  • A. To find some insecurity in a cryptographic scheme
  • B. To increase the speed
  • C. To encrypt the data
  • D. To make new ciphers
Which one of the following is a cryptographic protocol used to secure HTTP connection?
  • A. Stream control transmission protocol (sctp)
  • B. Transport layer security (tls)
  • C. Explicit congestion notification (ecn)
  • D. Resource reservation protocol
Voice privacy in GSM cellular telephone protocol is provided by _______
  • A. A5/2 cipher
  • B. B5/4 cipher
  • C. B5/6 cipher
  • D. B5/8 cipher
ElGamal encryption system is __________
  • A. Symmetric key encryption algorithm
  • B. Asymmetric key encryption algorithm
  • C. Not an encryption algorithm
  • D. Block cipher method