By: Prof. Dr. Fazal Rehman | Last updated: September 23, 2024
Which of the following is a symmetric encryption algorithm used for database encryption?
a) RSA
b) AES
c) ECC
d) Diffie-HellmanAnswer: b) AES
What is the main advantage of symmetric encryption over asymmetric encryption?
a) Symmetric encryption provides stronger security.
b) Symmetric encryption is generally faster and requires less computational power.
c) Symmetric encryption uses two different keys for encryption and decryption.
d) Symmetric encryption does not require key management.Answer: b) Symmetric encryption is generally faster and requires less computational power.
Which encryption algorithm uses a pair of keys, one for encryption and one for decryption?
a) AES
b) DES
c) RSA
d) 3DESAnswer: c) RSA
What is the purpose of a hashing algorithm in the context of data encryption?
a) To encrypt and decrypt data
b) To generate a fixed-size hash value from variable-size input data
c) To manage encryption keys
d) To compress data before encryptionAnswer: b) To generate a fixed-size hash value from variable-size input data
Which of the following is a common hashing algorithm used in database systems for password storage?
a) RSA
b) SHA-256
c) AES
d) DESAnswer: b) SHA-256
In which type of encryption does the encryption key and the decryption key differ?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Key managementAnswer: b) Asymmetric encryption
What is the primary purpose of using a cryptographic salt in encryption?
a) To increase encryption speed
b) To add randomness to hashed data and protect against rainbow table attacks
c) To manage encryption keys securely
d) To compress data before encryptionAnswer: b) To add randomness to hashed data and protect against rainbow table attacks
Which encryption mode ensures that each block of plaintext is encrypted using the previous block’s ciphertext to provide enhanced security?
a) Electronic Codebook (ECB)
b) Cipher Block Chaining (CBC)
c) Counter (CTR)
d) Galois/Counter Mode (GCM)Answer: b) Cipher Block Chaining (CBC)
What is the main security benefit of using the Advanced Encryption Standard (AES) over the Data Encryption Standard (DES)?
a) AES has a longer key length and is more resistant to brute-force attacks compared to DES.
b) AES is simpler to implement than DES.
c) AES does not require key management.
d) AES operates faster than DES.Answer: a) AES has a longer key length and is more resistant to brute-force attacks compared to DES.
Which cryptographic technique is used to ensure the integrity and authenticity of a message by generating a unique fixed-size string?
a) Encryption
b) Hashing
c) Symmetric key management
d) Digital signaturesAnswer: b) Hashing
Which mode of operation for block ciphers is often used to provide both data confidentiality and integrity?
a) Electronic Codebook (ECB)
b) Cipher Feedback (CFB)
c) Galois/Counter Mode (GCM)
d) Output Feedback (OFB)Answer: c) Galois/Counter Mode (GCM)
What is a key difference between stream ciphers and block ciphers?
a) Stream ciphers encrypt data in fixed-size blocks, while block ciphers encrypt data one bit at a time.
b) Stream ciphers encrypt data one bit or byte at a time, while block ciphers encrypt data in fixed-size blocks.
c) Stream ciphers use asymmetric encryption, while block ciphers use symmetric encryption.
d) Stream ciphers are generally slower than block ciphers.Answer: b) Stream ciphers encrypt data one bit or byte at a time, while block ciphers encrypt data in fixed-size blocks.
In which encryption technique is the initialization vector (IV) used to ensure that the same plaintext produces different ciphertexts on different encryptions?
a) RSA encryption
b) Electronic Codebook (ECB) mode
c) Cipher Block Chaining (CBC) mode
d) Data Encryption Standard (DES)Answer: c) Cipher Block Chaining (CBC) mode
What is a key management system used for in the context of database encryption?
a) To encrypt and decrypt database tables
b) To securely generate, store, and manage encryption keys
c) To perform hashing operations
d) To ensure data integrityAnswer: b) To securely generate, store, and manage encryption keys
Which encryption algorithm is designed to be resistant to attacks by quantum computers?
a) AES
b) RSA
c) SHA-256
d) Post-Quantum Cryptography algorithmsAnswer: d) Post-Quantum Cryptography algorithms