6.encryption & Digital Signatures
6.encryption & Digital Signatures
1. What is encryption?
a) A method to prevent phishing attacks
b) Converting plaintext into unreadable ciphertext
c) Deleting sensitive data
d) Monitoring network traffic
Answer: b
Explanation: Encryption is the process of converting readable plaintext into unreadable ciphertext to
protect data from unauthorized access.
2. Which of the following is a type of encryption algorithm?
a) Hashing
b) Symmetric and Asymmetric encryption
c) RAID
d) Firewall rules
Answer: b
Explanation: Symmetric and asymmetric encryption are two main types of encryption algorithms.
3. What is symmetric encryption?
a) Using a pair of keys for encryption and decryption
b) Using the same key for both encryption and decryption
c) Encrypting data using public keys only
d) Encrypting data without keys
Answer: b
Explanation: Symmetric encryption uses the same key for both encryption and decryption, making
it fast but less secure for sharing keys.
4. Which of the following is an example of a symmetric encryption algorithm?
a) RSA
b) AES
c) ECC
d) Diffie-Hellman
Answer: b
Explanation: AES (Advanced Encryption Standard) is a widely used symmetric encryption
algorithm.
5. What is asymmetric encryption?
a) Encryption that does not use any keys
b) Using a single shared key for all operations
c) Using a pair of public and private keys for encryption and decryption
d) A legacy encryption system
Answer: c
Explanation: Asymmetric encryption uses a pair of keys: one public and one private, providing
enhanced security for key exchange.
6. Which encryption algorithm is used for asymmetric encryption?
a) DES b) RSA c) Blowfish d) Triple DES
Answer: b
Explanation: RSA is a popular asymmetric encryption algorithm used for secure data transmission.
7. What is the purpose of a public key in encryption?
a) To encrypt and decrypt messages directly
b) To encrypt data that can only be decrypted with the matching private key
c) To hash passwords
d) To store sensitive information
Answer: b
Explanation: A public key is used to encrypt data, and only the corresponding private key can
decrypt it.
Digital Signatures
11. What is a digital signature?
a) A scanned image of a handwritten signature
b) A cryptographic mechanism to verify authenticity and integrity
c) An encrypted message
d) A method for encrypting files
Answer: b
Explanation: A digital signature is a cryptographic mechanism used to verify the authenticity and
integrity of digital data.
12. Which cryptographic method is used to create a digital signature?
a) Symmetric encryption b) Asymmetric encryption
c) Hashing only d) RAID
Answer: b
Explanation: Digital signatures rely on asymmetric encryption, where a private key is used to sign
data, and a public key is used for verification.
13. What is the main purpose of a digital signature?
a) To encrypt messages
b) To verify the sender’s identity and data integrity
c) To compress files
d) To exchange keys securely
Answer: b
Explanation: Digital signatures verify the authenticity of the sender and ensure that the data has not
been altered.
14. What is a hash function in the context of digital signatures?
a) Encrypting a message
b) Converting data into a fixed-size digest
c) Decrypting data using a private key
d) Exchanging encryption keys
Answer: b
Explanation: A hash function converts input data into a fixed-size digest, which is then used in the
digital signature process.
Mixed Concepts
21. What is the difference between encryption and hashing?
a) Encryption is reversible; hashing is not
b) Hashing is reversible; encryption is not
c) Both encryption and hashing are reversible
d) Neither encryption nor hashing is reversible
Answer: a
Explanation: Encryption can be reversed using keys, while hashing is a one-way process and cannot
be reversed.