9 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (51) Q(1). Cryptography is the study of information______: (A) Hiding (B) Verification (C) Both of Above (D) None of These Q(2). Cryptography includes the __________to securely and consistently prevent or delay unauthorized access to sensitive information and enable verifiability of every component in communication: (A) Protocols (B) Algorithms (C) Strategies (D) All of the Above (E) None of These Q(3). Cryptography and Cryptanalysis are sometimes grouped together under the ____term cryptology, encompassing the entire subject. In practice, "cryptography" is also often used to refer to the field as a whole, especially as an applied science: (A) Umbrella (B) Shield (C) Veil (D) None of These Q(4). Cryptography is an interdisciplinary subject, drawing from several fields. Before the time of computers, it was closely related to linguistic. Nowadays the emphasis has shifted, and cryptography makes extensive use of technical areas of mathematics, especially those areas collectively known as _______mathematics: (A) Increte (B) Discrete (C) Both of Above (D) None of These Q(5). An example of the sub-fields of cryptography is: (A) Steganography (B) Traffic Analysis (C) Both of Above (D) None of These Q(6). Which among the following is correct: (A) Traffic Analysis is the analysis of patterns of communication in order to learn secret information. (B) Steganography is the study of hiding the very existence of a message, and not necessarily the contents of the message itself like microdots or invisible ink. (C) Both of Above (D) None of These Q(7). When information is transformed from a useful form of understanding to an opaque form of understanding, this is called: (A) Encryption (B) Decryption (C) Both of Above (D) None of These Q(8). When the information is reverted back into a useful form, it is called: (A) Standard encryption (B) Plain text encryption (C) Decryption (D) None of These Q(9). Symmetric-key cryptography refers to ______methods in which both the sender and receiver share the same key (or, less commonly, in which their keys are different but related in an easily computable way): (A) Encryption (B) Decryption (C) Both of above (D) None of These Q(10). Symmetric key cryptography was the only kind of encryption publicly known until: (A) July 195 (B) June 1976 (C) June 1988 (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit