0% found this document useful (0 votes)
11 views1 page

Rejinpaul App From Playstore

The document discusses cryptography techniques including symmetric key cryptography, public key cryptography and hash functions. It also talks about plain text, cipher text and the objectives of cryptography which are confidentiality, data integrity, authentication but not data redundancy.

Uploaded by

datatop
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views1 page

Rejinpaul App From Playstore

The document discusses cryptography techniques including symmetric key cryptography, public key cryptography and hash functions. It also talks about plain text, cipher text and the objectives of cryptography which are confidentiality, data integrity, authentication but not data redundancy.

Uploaded by

datatop
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

www.rejinpaul.

com

c) raw text
d) encrypted text
Answer: b
Explanation: The means of storing or sending data in a specific format so that only
intended users can process it is called cryptography. Data which is easily readable &
understandable without any special algorithm or method is called plain text.

22. Plain text are also called _____________


a) cipher-text
b) raw text
c) clear-text
d) encrypted text
Answer: c
Explanation: Data which is easily readable & understandable without any special
algorithm or method is called plain text or clear-text. This text is not secured and can be
readable by anyone who is not even a legitimate user.

23. There are ________ types of cryptographic techniques used in general.


a) 2
b) 3
c) 4
d) 5
Answer: b
Explanation: There are three types of cryptographic techniques used in general. These
are Symmetric Key cryptography, public key cryptography, and Hash functions based
cryptography.

24. Conventional cryptography is also known as _____________ or symmetric-key


encryption.
a) secret-key
b) public key
c) protected key
d) primary key
Answer: a
Explanation: The various cryptographic techniques are symmetric Key cryptography,
public key cryptography, and Hash functions based cryptography. Conventional
cryptography is also known as secret-key cryptography or symmetric-key encryption.

25. Which of the following is not the primary objective of cryptography?


a) Confidentiality
b) Data Integrity
c) Data Redundancy
d) Authentication
Answer: c
Explanation: The key intent of implementing cryptography is to offer the following 4
fundamental information security features. These are Confidentiality, Data Integrity,
Authentication and non-repudiation.

26. Cryptography offers a set of required security services. Which of the following is not
among that 4 required security services?
a) Encryption
b) Message Authentication codes

Download Rejinpaul App from Playstore

You might also like