- Which of the following is a symmetric encryption algorithm used for database encryption?
a) RSA
b) AES
c) ECC
d) Diffie-HellmanAnswer: b) AES - What is the main advantage of symmetric encryption over asymmetric encryption?
a) Symmetric encryption provides stronger security.
b) Symmetric encryption is generally faster and requires less computational power.
c) Symmetric encryption uses two different keys for encryption and decryption.
d) Symmetric encryption does not require key management.Answer: b) Symmetric encryption is generally faster and requires less computational power. - Which encryption algorithm uses a pair of keys, one for encryption and one for decryption?
a) AES
b) DES
c) RSA
d) 3DESAnswer: c) RSA - What is the purpose of a hashing algorithm in the context of data encryption?
a) To encrypt and decrypt data
b) To generate a fixed-size hash value from variable-size input data
c) To manage encryption keys
d) To compress data before encryptionAnswer: b) To generate a fixed-size hash value from variable-size input data - Which of the following is a common hashing algorithm used in database systems for password storage?
a) RSA
b) SHA-256
c) AES
d) DESAnswer: b) SHA-256 - In which type of encryption does the encryption key and the decryption key differ?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Key managementAnswer: b) Asymmetric encryption - What is the primary purpose of using a cryptographic salt in encryption?
a) To increase encryption speed
b) To add randomness to hashed data and protect against rainbow table attacks
c) To manage encryption keys securely
d) To compress data before encryptionAnswer: b) To add randomness to hashed data and protect against rainbow table attacks - Which encryption mode ensures that each block of plaintext is encrypted using the previous block’s ciphertext to provide enhanced security?
a) Electronic Codebook (ECB)
b) Cipher Block Chaining (CBC)
c) Counter (CTR)
d) Galois/Counter Mode (GCM)Answer: b) Cipher Block Chaining (CBC) - What is the main security benefit of using the Advanced Encryption Standard (AES) over the Data Encryption Standard (DES)?
a) AES has a longer key length and is more resistant to brute-force attacks compared to DES.
b) AES is simpler to implement than DES.
c) AES does not require key management.
d) AES operates faster than DES.Answer: a) AES has a longer key length and is more resistant to brute-force attacks compared to DES. - Which cryptographic technique is used to ensure the integrity and authenticity of a message by generating a unique fixed-size string?
a) Encryption
b) Hashing
c) Symmetric key management
d) Digital signaturesAnswer: b) Hashing - Which mode of operation for block ciphers is often used to provide both data confidentiality and integrity?
a) Electronic Codebook (ECB)
b) Cipher Feedback (CFB)
c) Galois/Counter Mode (GCM)
d) Output Feedback (OFB)Answer: c) Galois/Counter Mode (GCM) - What is a key difference between stream ciphers and block ciphers?
a) Stream ciphers encrypt data in fixed-size blocks, while block ciphers encrypt data one bit at a time.
b) Stream ciphers encrypt data one bit or byte at a time, while block ciphers encrypt data in fixed-size blocks.
c) Stream ciphers use asymmetric encryption, while block ciphers use symmetric encryption.
d) Stream ciphers are generally slower than block ciphers.Answer: b) Stream ciphers encrypt data one bit or byte at a time, while block ciphers encrypt data in fixed-size blocks. - In which encryption technique is the initialization vector (IV) used to ensure that the same plaintext produces different ciphertexts on different encryptions?
a) RSA encryption
b) Electronic Codebook (ECB) mode
c) Cipher Block Chaining (CBC) mode
d) Data Encryption Standard (DES)Answer: c) Cipher Block Chaining (CBC) mode - What is a key management system used for in the context of database encryption?
a) To encrypt and decrypt database tables
b) To securely generate, store, and manage encryption keys
c) To perform hashing operations
d) To ensure data integrityAnswer: b) To securely generate, store, and manage encryption keys - Which encryption algorithm is designed to be resistant to attacks by quantum computers?
a) AES
b) RSA
c) SHA-256
d) Post-Quantum Cryptography algorithmsAnswer: d) Post-Quantum Cryptography algorithms
More MCQs Of Database Systems
- Database Models MCQs in DBMS
- Relational Database Model MCQs in DBMS
- SQL (Structured Query Language) MCQs in DBMS
- Database Design MCQs in DBMS
- Database Management System Architecture MCQs in DBMS
- Storage and File Structure MCQs in DBMS
- Query Processing and Optimization MCQs in DBMS
- Database Transaction Management MCQs in DBMS
- Database Security and Authorization MCQs in DBMS
- Backup and Recovery MCQs in DBMS
- Distributed Databases MCQs in DBMS
- SET 1: database design mcqs (database design mcqs )
- SET 2: database mcqs with answers pdf (database mcqs with answers pdf )
- SET 3: modern database management 12th edition mcqs (modern database management 12th edition mcqs)
- SET 4: database systems mcqs (database systems mcqs)
- SET 5: dbms mcqs (dbms mcqs )
- SET 6: dbms mcqs with answers (dbms mcqs with answers)
- SET 7: solved mcqs of dbms (solved mcqs of dbms)
- SET 8: dbms mcqs with answers pdf(dbms mcqs with answers pdf)
- SET 9: relational database management system mcqs(relational database management system mcqs)
- SET 10: solved mcqs of database management system(solved mcqs of database management system)
- SET 11: basic database mcqs pdf (basic database mcqs pdf)
- SET 12: relational database management system mcqs (relational database management system mcqs )
- SET 13: database mcqs online test (database mcqs online test)
- SET 14: database interview questions mcqs (database interview questions mcqs)
- SET 15: database developer mcqs (database developer mcqs)
- SET 16: database Repeated mcqs (database Repeated mcqs)
- SET 17: Database mcqs PPSC (Database mcqs PPSC)
- SET 18: Database mcqs FPSC (Database mcqs FPSC)
- SET 19: DBMS mcqs FPSC (DBMS mcqs FPSC)
New Arrival