Question No : 8
RSA algorithm is ____ cryptography algorithm.
Question No : 9
Amongst which of the following is / are true with reference to the rounds in AES
Question No : 10
Which of the following is not a type of symmetric-key cryptography technique?
Question No : 11
Which of the following is not a principle of data security?
Question No : 12
Which of the following security attacks is not an active attack? ORWhich of the following attacks is a passive attack?
Question No : 13
Which of the following options correctly defines the Brute force attack?
Question No : 14
A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?
Wanna test your skill? Here are some exams we prepared for you. So if you need to test your skill just attempt any exam from bellow.
Exam Name | No. Of Q | Link |
Computer set 1 | 30 | Start |
Computer set 2 | 30 | Start |
Computer set 3 | 30 | Start |
Computer set 4 | 30 | Start |
Computer set 5 | 30 | Start |
Computer set 6 | 30 | Start |
Computer set 7 | 30 | Start |
Computer set 8 | 30 | Start |
Computer set 9 | 30 | Start |
Computer set 10 | 30 | Start |
Computer set 11 | 30 | Start |
Computer set 12 | 30 | Start |