Friday, 6 May 2016

Filled Under:

Computer Quiz for SBI Day-4

“Mission SBI Clerk”

We are here for you and now your exam in your head,so let's join your hands with us and boot your knowledge to crack your SBI exam, this is just our initiative to grip hard your seat in exam, here is the the Full plate of our baked quiz of computer.


Q1. Cryptography is derived from the ____word:
a) Greek
b) French
c) Latin
d) None of These

Q2. Cryptography is the study of information______:
a) Hiding
b) Verification
c) Both of Above
d) None of These

Q3. Cryptography includes the __________to securely and consistently prevent
or delay unauthorized access to sensitive information and enable verifiability of
every component in a communication:
a) Protocols
b) Algorithms
c) Strategies
d) All of the Above
e) None of These

Q4. Cryptography and Cryptanalysis are sometimes grouped together under the
____term cryptology, encompassing the entire subject. In practice,

"cryptography" is also often used to refer to the field as a whole, especially as an
applied science:
a) Umbrella
b) Shield   
c) Veil
d) None of These

Q5. Cryptography is an interdisciplinary subject, drawing from several fields.
Before the time of computers, it was closely related to linguistic. Nowadays the
emphasis has shifted, and cryptography makes extensive use of technical ares of
mathematics, especially those areas collectively known as _______mathematics:
a) Increte
b) Discrete
c) Both of Above
d) None of These

Q6. An example of the sub - fields of cryptography is:
a) Steganography
b) Traffic Analysis
c) Both of Above
d) None of These

Q7. Which among the following is correct:
a) Traffic Analysis is the analysis of patterns of communication in order to learn secret
b) Steganography is the study of hiding the very existence of a message, and not necessarily the
contents of the message itself like microdots or invisible ink.
c) Both of Above
d) None of These

Q8. When information is transformed from a useful form of understanding to an
opaque form of understanding, this is called:
a) Encryption
b) Decryption
c) Both of Above
d) None of These

Q9. When the information is reverted back into a useful form it is called:
a) Standard encryption   
b) Plain text encryption
c) Decryption
d) None of These
Q10. Symmetric - key cryptography refers to ______methods in which both the
sender and receiver share the same key ( or , less commonly, in which their keys
are different but related in an easily computable way):
a) Encryption
b) Decryption
c) Both of above
d) None of These
Sharing is Caring, Please Do Share

Like us to get Quality Ebooks and Job updates



Latest Sarkari Jobs 2017