Test Series - computer fundamental

Test Number 94/95

Q: A cipher in which the order is not preserved.
A. Polyalphabetic substitution based
B. Transposition-based
C. Substitution based
D. Public key based
Solution: In transposition-based cipher, the order of the plain text is not preserved. They can be very simple to identify.
Q: Plain text is the data after encryption is performed.
A. True
B. False
C. .
D. none
Solution: The statement is false. Cipher is the algorithm used in encryption. Ciphertext is the data after encryption is performed.
Q: A unique piece of information that is used in encryption.
A. Cipher
B. Plain Text
C. Key
D. Cipher
Solution: The key is the unique piece of information. It is used to create the cipher text and decrypt it back.
Q: Study of creating a d using encryption and decryption techniques.
A. Cipher
B. Cryptography
C. Encryption
D. Decryption
Solution: It is called as cryptography. It is the study of creating and using the encryption techniques.
Q: The process of transforming plain text into unreadable text.
A. Decryption
B. Encryption
C. Network Security
D. Information Hiding
Solution: Encryption is the process of transforming readable text i.e. plain text to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
Q: An algorithm used in encryption is referred to as cipher.
A. True
B. False
C. none
D. .
Solution: The statement is true. Cipher is the algorithm used in encryption. Encryption is making readable text as unreadable to keep it secured.
Q: A process of making the encrypted text readable again.
A. Decryption
B. Encryption
C. Network Security
D. Information Hiding
Solution: The reverse process is called decryption. It is the process of making the information readable again.
Q: Attack in which a user creates a packet that appears to be something else.
A. Smurfing
B. Trojan
C. E-mail bombing
D. Spoofing
Solution: The attack is a spoofing attack. It is when a user creates a packet that appears to be something else or from someone else.
Q: A technique in which a program attacks a network by exploiting IP broadcast addressing operations.
A. Smurfing
B. Denial of service
C. E-mail bombing
D. Ping storm
Solution: Smurfing is a technique in which a program attacks a network by exploiting IP broadcast addressing operations.
Q: An attack in which the user receives unwanted amount of e-mails.
A. Smurfing
B. Denial of service
C. E-mail bombing
D. Ping storm
Solution: In the case of denial of e-mail bombing, a user sends an excessive amount of unwanted e-mail to someone.

You Have Score    /10