Tag: security

Questions Related to security

What do we call a person who works on breking the Cyphers

  1. Decryptor

  2. Cryptanalyst

  3. Hacker

  4. Decoder


Correct Option: B
  1. Ruby Crystal Lasers

  2. Silicon Diode Laser

  3. Infra Red Lasers

  4. Compound Laser


Correct Option: C

How many interative steps does The AES have for Encryption for 128 and 192 bits

  1. 8

  2. 9

  3. 10

  4. 11


Correct Option: A,C

Identify the Two parts of Blow fish Encryption

  1. Modulation of data

  2. encryption of the data

  3. expansion of the key

  4. Join Key to data


Correct Option: B,C

Blow fish is Patented

  1. True

  2. False


Correct Option: B

AES has 3 summetric encryption Boxes S-BOX,P-Box and D- Box

  1. True

  2. False


Correct Option: B