Question 1

Which encryption algorithm is considered the most secure for symmetric encryption in modern cryptographic systems?

A) DES
B) 3DES
C) AES
D) RSA

Answer: C) AES

Explanation: AES (Advanced Encryption Standard) is widely used for symmetric encryption due to its strong security, efficiency, and resistance to cryptanalysis. It supports 128, 192, and 256-bit key lengths, making it superior to older algorithms like DES and 3DES.


Question 2

Which key size is most commonly recommended for AES encryption in high-security applications?

A) 64-bit
B) 128-bit
C) 192-bit
D) 256-bit

Answer: D) 256-bit

Explanation: AES-256 is preferred in high-security applications due to its longer key length, making brute-force attacks impractical with current computing power.


Question 3

Which encryption mode is generally NOT recommended due to predictable ciphertext patterns?

A) CBC
B) GCM
C) ECB
D) CTR

Answer: C) ECB

Explanation: ECB (Electronic Codebook) mode encrypts identical plaintext blocks into identical ciphertext blocks, making it vulnerable to pattern analysis attacks. Modes like CBC, GCM, and CTR add randomness (IV or nonce) to prevent this issue.


Question 4

Which type of cryptographic attack is mitigated by using an Initialization Vector (IV)?

A) Brute force attack
B) Padding oracle attack
C) Replay attack
D) Ciphertext pattern analysis

Answer: D) Ciphertext pattern analysis

Explanation: An IV ensures that identical plaintext blocks encrypt to different ciphertexts, preventing pattern recognition attacks like those affecting ECB mode.


Question 5

Which of the following is a public key encryption algorithm?

A) AES
B) DES
C) RSA
D) ChaCha20

Answer: C) RSA

Explanation: RSA is an asymmetric encryption algorithm that uses a public-private key pair, while AES, DES, and ChaCha20 are symmetric encryption methods.


Question 6

Why is RSA encryption not recommended for encrypting large amounts of data?

A) It is too weak
B) It is computationally expensive
C) It requires a shared secret
D) It does not support key exchange

Answer: B) It is computationally expensive

Explanation: RSA encryption is slow for large data, so it is often used to encrypt symmetric keys (e.g., AES keys) instead of entire messages.


Question 7

Which key exchange algorithm is commonly used alongside RSA for secure communication?

A) SHA-256
B) ECDSA
C) Diffie-Hellman
D) HMAC

Answer: C) Diffie-Hellman

Explanation: Diffie-Hellman allows two parties to securely exchange cryptographic keys over an insecure channel and is often used with RSA for secure key exchange.


Question 8

Which property ensures that encrypted data cannot be altered without detection?

A) Confidentiality
B) Integrity
C) Authentication
D) Anonymity

Answer: B) Integrity

Explanation: Integrity ensures that data remains unmodified. Cryptographic techniques like HMAC and digital signatures are used to detect alterations.


Question 9

Which of the following is a modern alternative to AES for high-performance symmetric encryption?

A) RC4
B) Blowfish
C) ChaCha20
D) DES

Answer: C) ChaCha20

Explanation: ChaCha20 is a stream cipher known for its speed and security, making it a good alternative to AES, especially in mobile and low-power environments.


Question 10

Which hashing algorithm is considered insecure due to collisions?

A) SHA-1
B) SHA-256
C) SHA-512
D) Argon2

Answer: A) SHA-1

Explanation: SHA-1 has known collision vulnerabilities, meaning two different inputs can produce the same hash. Modern systems use SHA-256, SHA-512, or Argon2.


Question 11

Which encryption method is typically used for securing passwords?

A) AES
B) RSA
C) PBKDF2
D) DES

Answer: C) PBKDF2

Explanation: PBKDF2 (Password-Based Key Derivation Function 2) is designed for securely storing passwords by making brute-force attacks computationally expensive.


Question 12

Which of the following is not a recommended practice for key management?

A) Using hardcoded keys in source code
B) Using a secure key vault
C) Using hardware security modules (HSMs)
D) Rotating keys periodically

Answer: A) Using hardcoded keys in source code

Explanation: Hardcoding keys exposes them to attackers. Secure key management solutions like key vaults and HSMs prevent unauthorized access.


Question 13

Which encryption mode provides both confidentiality and authentication?

A) CBC
B) ECB
C) GCM
D) OFB

Answer: C) GCM

Explanation: GCM (Galois/Counter Mode) provides authenticated encryption by incorporating an authentication tag, preventing tampering.


Question 14

Which algorithm is used for digital signatures?

A) AES
B) SHA-256
C) RSA
D) ChaCha20

Answer: C) RSA

Explanation: RSA can be used for digital signatures, ensuring message integrity and authenticity.


Question 15

Which protocol is used to secure web communications via encryption?

A) SSH
B) SSL/TLS
C) FTP
D) Telnet

Answer: B) SSL/TLS

Explanation: TLS (previously SSL) encrypts data in transit, securing web communications over HTTPS.


Question 16

What is the main advantage of Elliptic Curve Cryptography (ECC) over RSA?

A) Faster encryption speed
B) Requires shorter keys for the same security level
C) More resistant to side-channel attacks
D) Uses symmetric encryption

Answer: B) Requires shorter keys for the same security level

Explanation: ECC provides strong security with shorter key lengths compared to RSA, reducing computational overhead.


Question 17

Which cryptographic attack exploits weak randomness in key generation?

A) Side-channel attack
B) Birthday attack
C) Key recovery attack
D) Predictable key attack

Answer: D) Predictable key attack

Explanation: Weak randomness in key generation can make keys predictable, allowing attackers to guess or derive them.


Question 18

Which encryption technique is best suited for securing sensitive data stored on a database?

A) Hashing
B) Symmetric encryption (AES)
C) Asymmetric encryption (RSA)
D) Base64 encoding

Answer: B) Symmetric encryption (AES)

Explanation: AES is commonly used to encrypt stored data, ensuring confidentiality. Hashing is used for passwords, not for encrypting retrievable data.


Question 19

Which of the following is a common mistake in implementing encryption?

A) Using AES-256
B) Reusing IVs in CBC mode
C) Using key stretching
D) Using authenticated encryption

Answer: B) Reusing IVs in CBC mode

Explanation: Reusing IVs can lead to vulnerabilities in encryption schemes, as it may expose patterns in ciphertext.


Question 20

Which of the following is a widely recommended algorithm for encrypting API secrets?

A) AES-GCM
B) RC4
C) DES
D) MD5

Answer: A) AES-GCM

Explanation: AES-GCM provides strong encryption with authentication, making it ideal for securing API secrets.


Question 21

Which of the following is a best practice for securely storing encryption keys?

A) Storing them in the database alongside encrypted data
B) Using environment variables in plain text
C) Storing them in a secure key management system (KMS)
D) Hardcoding them in the application code

Answer: C) Storing them in a secure key management system (KMS)

Explanation: Secure key management systems (KMS) such as AWS KMS, HashiCorp Vault, or HSMs provide secure storage and access controls for encryption keys, preventing unauthorized access.


Question 22

Which of the following algorithms is specifically designed for password hashing and is recommended for secure password storage?

A) SHA-256
B) MD5
C) Argon2
D) AES-256

Answer: C) Argon2

Explanation: Argon2 is a modern password hashing algorithm designed to resist brute-force attacks by incorporating time and memory-hard functions, making it more secure than traditional hashing algorithms like SHA-256 and MD5.


Question 23

Which encryption technique is most suitable for securing data in transit over the internet?

A) AES-ECB
B) TLS (Transport Layer Security)
C) Base64 encoding
D) RSA-1024

Answer: B) TLS (Transport Layer Security)

Explanation: TLS is used to encrypt data in transit, securing communications over HTTPS and preventing interception by attackers.


Question 24

What is the primary weakness of the Diffie-Hellman key exchange algorithm?

A) It is vulnerable to brute-force attacks
B) It requires both parties to use the same private key
C) It is susceptible to man-in-the-middle (MITM) attacks if not authenticated
D) It does not support large key sizes

Answer: C) It is susceptible to man-in-the-middle (MITM) attacks if not authenticated

Explanation: Diffie-Hellman does not provide authentication, allowing an attacker to intercept and modify key exchanges unless used with an additional authentication mechanism (e.g., digital signatures).


Question 25

Which of the following is a lightweight, fast encryption algorithm suitable for mobile and IoT devices?

A) AES-GCM
B) RSA-2048
C) Blowfish
D) ChaCha20

Answer: D) ChaCha20

Explanation: ChaCha20 is a stream cipher optimized for speed and efficiency on resource-constrained devices, making it ideal for mobile and IoT security applications.


Question 26

What is the purpose of a salt in password hashing?

A) To make hashes faster to compute
B) To prevent hash collisions
C) To make brute-force and rainbow table attacks more difficult
D) To encrypt passwords before hashing

Answer: C) To make brute-force and rainbow table attacks more difficult

Explanation: A salt is a random value added to a password before hashing, ensuring that identical passwords generate unique hash values, preventing precomputed attack techniques like rainbow tables.


Question 27

Which cryptographic principle ensures that a sender cannot deny having sent a message?

A) Confidentiality
B) Integrity
C) Non-repudiation
D) Anonymity

Answer: C) Non-repudiation

Explanation: Non-repudiation ensures that the sender of a message cannot later deny sending it, typically achieved using digital signatures.


Question 28

Which cryptographic algorithm is best suited for securing email communications using digital signatures?

A) AES
B) RSA
C) SHA-1
D) MD5

Answer: B) RSA

Explanation: RSA is commonly used for digital signatures in email security protocols like PGP and S/MIME to verify sender authenticity and integrity.


Question 29

What is the purpose of Padding in encryption algorithms like AES?

A) To add extra security
B) To align the plaintext to the required block size
C) To slow down encryption operations
D) To compress data before encryption

Answer: B) To align the plaintext to the required block size

Explanation: Block ciphers like AES require plaintext to be of a fixed block size. Padding schemes like PKCS#7 ensure that data aligns properly.


Question 30

Which of the following is a quantum-resistant encryption algorithm?

A) RSA-4096
B) AES-256
C) ECC-384
D) Lattice-based cryptography

Answer: D) Lattice-based cryptography

Explanation: Lattice-based cryptography is being researched as a post-quantum encryption method that remains secure even against quantum computing threats.


Question 31

Which attack exploits improper padding validation in encryption schemes?

A) Brute force attack
B) Padding oracle attack
C) Timing attack
D) Meet-in-the-middle attack

Answer: B) Padding oracle attack

Explanation: Padding oracle attacks occur when an attacker can determine whether padding is valid or invalid, allowing them to decrypt messages without knowing the key.


Question 32

Which of the following should never be encrypted using asymmetric encryption like RSA?

A) SSL/TLS certificates
B) Passwords
C) Small messages
D) Session keys

Answer: B) Passwords

Explanation: Passwords should be hashed, not encrypted. Encryption can be reversed, whereas hashing is one-way.


Question 33

Which of the following best protects against brute-force attacks?

A) Increasing encryption key size
B) Using longer passwords
C) Rate-limiting and account lockouts
D) Using a weaker hash algorithm

Answer: C) Rate-limiting and account lockouts

Explanation: Implementing rate limits, account lockouts, and CAPTCHAs helps prevent attackers from continuously attempting password guesses.


Question 34

Which cryptographic attack is based on analyzing power consumption during encryption operations?

A) Side-channel attack
B) Chosen ciphertext attack
C) Dictionary attack
D) Timing attack

Answer: A) Side-channel attack

Explanation: Side-channel attacks exploit physical information leaks (such as power consumption, electromagnetic emissions, or execution time) to infer encryption keys.


Question 35

Which key size is the minimum recommended for RSA encryption today?

A) 512-bit
B) 1024-bit
C) 2048-bit
D) 8192-bit

Answer: C) 2048-bit

Explanation: RSA keys below 2048-bit are considered weak due to advancements in computational power. 2048-bit or higher is recommended.


Question 36

Which encryption algorithm is used in Bitcoin and blockchain technology?

A) AES
B) SHA-256
C) Blowfish
D) RSA

Answer: B) SHA-256

Explanation: SHA-256 is used in Bitcoin mining and blockchain hashing to secure transaction data.


Question 37

Which type of encryption is commonly used for encrypting file systems like BitLocker and VeraCrypt?

A) RSA
B) AES
C) DES
D) MD5

Answer: B) AES

Explanation: AES encryption is used in full-disk encryption solutions like BitLocker, FileVault, and VeraCrypt due to its strength and efficiency.


Question 38

Which of the following is a widely used hashing function for file integrity verification?

A) AES
B) SHA-256
C) RSA
D) ECC

Answer: B) SHA-256

Explanation: SHA-256 is used in checksum verification and digital signatures to ensure data integrity.


Question 39

Which protocol is used for end-to-end encryption in messaging apps like WhatsApp and Signal?

A) TLS
B) Signal Protocol
C) PGP
D) DES

Answer: B) Signal Protocol

Explanation: The Signal Protocol is used in WhatsApp, Signal, and other messaging apps to ensure end-to-end encryption of conversations.


Question 40

Which of the following is a major risk of improper key management?

A) Increased encryption speed
B) Key compromise and data breaches
C) Stronger encryption
D) Faster authentication

Answer: B) Key compromise and data breaches

Explanation: Poor key management can lead to exposed encryption keys, making encrypted data vulnerable to unauthorized decryption.


Question 41

What is the primary purpose of a cryptographic nonce?

A) To increase encryption speed
B) To prevent replay attacks
C) To compress encrypted data
D) To generate encryption keys

Answer: B) To prevent replay attacks

Explanation: A nonce (number used once) is a unique value used to ensure that an encrypted message is not reused or replayed, preventing replay attacks in cryptographic protocols.


Question 42

Which of the following statements about homomorphic encryption is true?

A) It allows computations to be performed on encrypted data without decryption
B) It is the fastest encryption algorithm available
C) It does not require a key to function
D) It is mainly used for hashing passwords

Answer: A) It allows computations to be performed on encrypted data without decryption

Explanation: Homomorphic encryption enables computations on encrypted data without decrypting it, making it useful for secure cloud computing and privacy-preserving applications.


Question 43

Which encryption method is most suitable for securing stored API keys?

A) AES-GCM
B) RSA-1024
C) MD5
D) SHA-1

Answer: A) AES-GCM

Explanation: AES-GCM provides both encryption and authentication, making it ideal for securely storing API keys and other sensitive data.


Question 44

Which of the following is a secure password storage method?

A) Hashing with SHA-256 without a salt
B) Encrypting passwords using AES
C) Using PBKDF2, bcrypt, or Argon2 with a salt
D) Storing plain-text passwords in a database

Answer: C) Using PBKDF2, bcrypt, or Argon2 with a salt

Explanation: PBKDF2, bcrypt, and Argon2 are designed for secure password hashing, using salting and key stretching to prevent brute-force attacks.


Question 45

Which of the following encryption algorithms is best suited for low-power IoT devices?

A) RSA-2048
B) AES-256
C) ChaCha20
D) SHA-512

Answer: C) ChaCha20

Explanation: ChaCha20 is a fast, secure, and lightweight encryption algorithm, making it suitable for IoT devices with low processing power.


Question 46

Which attack exploits timing variations in cryptographic operations to extract secret keys?

A) Rainbow table attack
B) Timing attack
C) Brute-force attack
D) Birthday attack

Answer: B) Timing attack

Explanation: A timing attack analyzes the time taken for cryptographic operations to infer private keys, often targeting RSA and ECC implementations.


Question 47

What is key stretching, and why is it used?

A) A method to extend the length of encryption keys
B) A technique to slow down brute-force attacks on passwords
C) A way to generate multiple keys from a single master key
D) A compression technique for cryptographic data

Answer: B) A technique to slow down brute-force attacks on passwords

Explanation: Key stretching is used in password hashing (e.g., PBKDF2, bcrypt, Argon2) to make brute-force attacks computationally expensive by increasing hashing iterations.


Question 48

Which cryptographic technique ensures that two parties can securely establish a shared secret over an insecure channel?

A) AES-GCM
B) Diffie-Hellman key exchange
C) SHA-256
D) RSA digital signatures

Answer: B) Diffie-Hellman key exchange

Explanation: Diffie-Hellman key exchange allows two parties to securely agree on a shared encryption key without directly transmitting it.


Question 49

What is a primary advantage of using elliptic curve cryptography (ECC) over RSA?

A) ECC keys are shorter for the same security level
B) ECC is faster for symmetric encryption
C) ECC is less secure than RSA
D) ECC does not require private keys

Answer: A) ECC keys are shorter for the same security level

Explanation: ECC provides the same security as RSA but with much shorter keys, reducing computational requirements while maintaining security.


Question 50

What is a Hybrid Cryptosystem?

A) A system that combines both symmetric and asymmetric encryption
B) A system that encrypts and hashes data simultaneously
C) A system that uses both digital signatures and hashing
D) A system that uses encryption without keys

Answer: A) A system that combines both symmetric and asymmetric encryption

Explanation: Hybrid cryptosystems use asymmetric encryption (RSA, ECC) for key exchange and symmetric encryption (AES, ChaCha20) for data encryption, combining security and efficiency.


Question 51

Which encryption method is best for encrypting data at rest in a database?

A) RSA
B) AES
C) SHA-256
D) Diffie-Hellman

Answer: B) AES

Explanation: AES is optimized for encrypting large data and is the preferred choice for encrypting data stored in databases and file systems.


Question 52

Which protocol is used for secure shell (SSH) connections?

A) RSA
B) AES-GCM
C) TLS
D) SSH-2

Answer: D) SSH-2

Explanation: SSH-2 is the most widely used secure shell protocol, encrypting data transfers and authentication for secure remote access.


Question 53

What is the role of a Certificate Authority (CA) in cryptography?

A) To generate symmetric encryption keys
B) To authenticate the identity of entities in public key infrastructure (PKI)
C) To encrypt SSL/TLS traffic
D) To replace digital signatures

Answer: B) To authenticate the identity of entities in public key infrastructure (PKI)

Explanation: A CA issues digital certificates that authenticate identities and enable secure TLS/SSL communications.


Question 54

What does Perfect Forward Secrecy (PFS) provide in encryption?

A) Ensures that past communications remain secure even if a private key is compromised
B) Encrypts data without requiring a key
C) Increases encryption speed
D) Prevents brute-force attacks

Answer: A) Ensures that past communications remain secure even if a private key is compromised

Explanation: PFS generates a unique session key for each session, preventing past encrypted messages from being decrypted even if long-term private keys are compromised.


Question 55

Which hashing algorithm is recommended for verifying file integrity?

A) RSA
B) SHA-3
C) AES
D) ECC

Answer: B) SHA-3

Explanation: SHA-3 is a secure cryptographic hash function used for ensuring file integrity and preventing data tampering.


Question 56

Which of the following is a common vulnerability in weak encryption implementations?

A) Using AES with 256-bit keys
B) Reusing the same encryption key for multiple purposes
C) Using authenticated encryption
D) Using long salt values in password hashing

Answer: B) Reusing the same encryption key for multiple purposes

Explanation: Key reuse weakens security because an attacker can analyze patterns over time, making decryption easier.


Question 57

Which attack attempts to recover cryptographic keys by analyzing electromagnetic emissions?

A) Dictionary attack
B) Timing attack
C) TEMPEST attack
D) Chosen ciphertext attack

Answer: C) TEMPEST attack

Explanation: A TEMPEST attack exploits electromagnetic emissions from electronic devices to extract cryptographic keys.


Question 58

What is a rainbow table attack?

A) An attack that exploits weak random number generators
B) An attack that uses precomputed hashes to crack passwords
C) An attack that targets asymmetric encryption
D) A brute-force attack on encryption keys

Answer: B) An attack that uses precomputed hashes to crack passwords

Explanation: Rainbow tables store precomputed hash values to quickly crack weak or unsalted password hashes.


Question 59

Which encryption standard is used by the U.S. government for classified information?

A) Blowfish
B) AES
C) RC4
D) DES

Answer: B) AES

Explanation: AES (Advanced Encryption Standard) is the official encryption standard used by the U.S. government for securing classified and sensitive information, replacing the older DES algorithm.


Question 60

Which cryptographic attack exploits weak random number generators used in key generation?

A) Meet-in-the-middle attack
B) Replay attack
C) Predictable key attack
D) Known plaintext attack

Answer: C) Predictable key attack

Explanation: Predictable key attacks occur when cryptographic key generation relies on weak or poorly seeded random number generators, making key values easier to guess.


Question 61

Which of the following cryptographic techniques provides data integrity but not confidentiality?

A) AES-256
B) RSA encryption
C) SHA-256 hashing
D) Elliptic Curve Cryptography (ECC)

Answer: C) SHA-256 hashing

Explanation: SHA-256 is a hashing algorithm that ensures data integrity by producing a fixed-length hash, but it does not provide confidentiality since it does not encrypt data.


Question 62

Which of the following encryption schemes is most vulnerable to a chosen ciphertext attack if implemented incorrectly?

A) AES-GCM
B) RSA with PKCS#1 v1.5 padding
C) ChaCha20-Poly1305
D) Diffie-Hellman key exchange

Answer: B) RSA with PKCS#1 v1.5 padding

Explanation: RSA with PKCS#1 v1.5 padding is vulnerable to Bleichenbacher’s chosen ciphertext attack, which allows attackers to decrypt messages without knowing the private key.


Question 63

What is the main risk of using ECB mode in AES encryption?

A) Slow encryption speed
B) High computational requirements
C) Identical plaintext blocks produce identical ciphertext blocks
D) Key exchange issues

Answer: C) Identical plaintext blocks produce identical ciphertext blocks

Explanation: ECB mode encrypts identical plaintext blocks into identical ciphertext blocks, making it vulnerable to pattern analysis attacks.


Question 64

Which cryptographic attack compares different encrypted versions of the same plaintext to find patterns?

A) Chosen ciphertext attack
B) Frequency analysis attack
C) Brute-force attack
D) Ciphertext-only attack

Answer: B) Frequency analysis attack

Explanation: Frequency analysis identifies patterns in ciphertext by comparing the frequency of characters or words, often used against classical ciphers.


Question 65

Which property of a cryptographic hash function ensures that even a small change in input results in a significantly different output?

A) Collision resistance
B) Avalanche effect
C) Key stretching
D) Asymmetry

Answer: B) Avalanche effect

Explanation: The avalanche effect ensures that small changes in input result in completely different hash outputs, increasing security.


Question 66

Which cryptographic technique is not commonly used for securing REST API communications?

A) HMAC authentication
B) AES encryption
C) JWT (JSON Web Tokens)
D) MD5 hashing

Answer: D) MD5 hashing

Explanation: MD5 is considered insecure due to collision vulnerabilities and should not be used for securing API communications.


Question 67

Which of the following is not a post-quantum cryptographic algorithm?

A) Lattice-based cryptography
B) RSA-4096
C) Hash-based cryptography
D) Multivariate polynomial cryptography

Answer: B) RSA-4096

Explanation: RSA-4096 is not quantum-safe, as quantum computers could break it using Shor’s algorithm, whereas lattice-based and hash-based cryptography offer quantum resistance.


Question 68

What is the primary purpose of salting in password hashing?

A) To speed up the hashing process
B) To generate stronger encryption keys
C) To ensure that identical passwords have unique hash outputs
D) To compress password hashes for storage efficiency

Answer: C) To ensure that identical passwords have unique hash outputs

Explanation: Salting adds randomness to passwords before hashing, preventing rainbow table and hash collision attacks.


Question 69

Which attack exploits the lack of authentication in Diffie-Hellman key exchange?

A) Man-in-the-middle (MITM) attack
B) Side-channel attack
C) Known plaintext attack
D) Padding oracle attack

Answer: A) Man-in-the-middle (MITM) attack

Explanation: Diffie-Hellman key exchange lacks built-in authentication, making it vulnerable to MITM attacks, where an attacker intercepts and alters key exchanges.


Question 70

Which of the following is not a valid reason for using asymmetric encryption?

A) Secure key exchange
B) Digital signatures
C) Encrypting large amounts of data efficiently
D) Ensuring non-repudiation

Answer: C) Encrypting large amounts of data efficiently

Explanation: Asymmetric encryption (e.g., RSA, ECC) is slow for encrypting large data, so it is mainly used for key exchange and digital signatures.


Question 71

Which protocol uses hybrid encryption to secure web traffic?

A) FTP
B) TLS
C) HTTP
D) SSH

Answer: B) TLS

Explanation: TLS (Transport Layer Security) uses hybrid encryptionasymmetric encryption for key exchange and symmetric encryption for data transfer.


Question 72

What is a zero-knowledge proof used for in cryptography?

A) Encrypting data without using keys
B) Proving knowledge of a secret without revealing it
C) Generating secure random numbers
D) Enhancing brute-force attacks

Answer: B) Proving knowledge of a secret without revealing it

Explanation: Zero-knowledge proofs (ZKPs) allow one party to prove that they know a secret without revealing the secret itself, commonly used in authentication and blockchain privacy protocols.


Question 73

Which encryption algorithm is commonly used for wireless network security?

A) RSA
B) AES-CCMP
C) RC4
D) DES

Answer: B) AES-CCMP

Explanation: AES-CCMP is used in WPA2/WPA3 wireless security protocols to encrypt Wi-Fi network traffic securely.


Question 74

Which of the following is a key exchange method used in TLS 1.3?

A) RSA key exchange
B) Static Diffie-Hellman
C) Ephemeral Elliptic Curve Diffie-Hellman (ECDHE)
D) MD5-based key derivation

Answer: C) Ephemeral Elliptic Curve Diffie-Hellman (ECDHE)

Explanation: TLS 1.3 uses ECDHE for secure key exchange, eliminating static RSA and static Diffie-Hellman to enhance forward secrecy.


Question 75

Which of the following techniques helps protect stored encryption keys from hardware-based attacks?

A) Hardcoding keys in source code
B) Using a Hardware Security Module (HSM)
C) Storing keys in plaintext
D) Using MD5 hashing

Answer: B) Using a Hardware Security Module (HSM)

Explanation: An HSM (Hardware Security Module) securely stores encryption keys, protecting them from hardware-based attacks and key extraction attempts.


Question 76

Which cryptographic algorithm is commonly used in blockchain technology to create digital signatures?

A) RSA
B) ECDSA
C) AES
D) RC4

Answer: B) ECDSA

Explanation: Elliptic Curve Digital Signature Algorithm (ECDSA) is widely used in blockchains (e.g., Bitcoin, Ethereum) to verify transactions securely.


Question 77

Which of the following is a common mistake in implementing cryptographic random number generators?

A) Using a hardware-based random number generator
B) Using a cryptographically secure pseudo-random number generator (CSPRNG)
C) Using rand() from the C standard library
D) Using /dev/urandom for key generation

Answer: C) Using rand() from the C standard library

Explanation: The rand() function is not cryptographically secure and should not be used for key generation or security-sensitive operations.


Question 78

Which attack targets incorrect padding implementations in cryptographic systems?

A) Birthday attack
B) Padding oracle attack
C) Known plaintext attack
D) Chosen ciphertext attack

Answer: B) Padding oracle attack

Explanation: Padding oracle attacks exploit improperly handled padding errors in encryption schemes like AES-CBC, allowing attackers to decrypt messages.


Question 79

Which key derivation function is recommended for deriving cryptographic keys from passwords?

A) PBKDF2
B) AES-ECB
C) SHA-1
D) DES

Answer: A) PBKDF2

Explanation: PBKDF2 (Password-Based Key Derivation Function 2) is used to derive encryption keys securely from user passwords, making brute-force attacks difficult.


Question 80

Which of the following is a post-quantum cryptography approach?

A) AES-256
B) Lattice-based cryptography
C) RSA-4096
D) SHA-256

Answer: B) Lattice-based cryptography

Explanation: Lattice-based cryptography is one of the leading quantum-resistant encryption methods, as it remains secure against attacks using quantum computers.


Question 81

Which encryption method is used in disk encryption solutions like BitLocker and VeraCrypt?

A) ECC
B) AES-XTS
C) RC4
D) RSA

Answer: B) AES-XTS

Explanation: AES-XTS (XEX-based Tweaked CodeBook Mode with Ciphertext Stealing) is optimized for full-disk encryption, ensuring secure storage.


Question 82

Which protocol is primarily used for email encryption?

A) SSH
B) PGP/GPG
C) TLS
D) SFTP

Answer: B) PGP/GPG

Explanation: Pretty Good Privacy (PGP) / GnuPG (GPG) is used to encrypt and digitally sign emails, providing confidentiality and authenticity.


Question 83

What is a side-channel attack in cryptography?

A) An attack that exploits vulnerabilities in key exchange algorithms
B) An attack that analyzes non-cryptographic data (e.g., power usage, timing, EM emissions)
C) A brute-force attack on encrypted data
D) An attack that targets weak passwords

Answer: B) An attack that analyzes non-cryptographic data (e.g., power usage, timing, EM emissions)

Explanation: Side-channel attacks extract cryptographic keys by analyzing physical characteristics like power consumption, timing, and electromagnetic radiation during encryption operations.


Question 84

Which technique is used to securely erase sensitive data from storage devices?

A) AES encryption
B) Secure wiping algorithms (e.g., DoD 5220.22-M, Gutmann method)
C) Hashing with SHA-256
D) Compressing the data

Answer: B) Secure wiping algorithms (e.g., DoD 5220.22-M, Gutmann method)

Explanation: Secure wiping algorithms overwrite stored data multiple times to ensure irrecoverability, preventing forensic recovery.


Question 85

Which encryption standard is used in TLS 1.3 for securing web traffic?

A) DES
B) AES-GCM
C) RC4
D) SHA-1

Answer: B) AES-GCM

Explanation: AES-GCM is the preferred encryption mode in TLS 1.3, providing both encryption and authentication for secure web communications.


Question 86

Which cryptographic concept ensures that different inputs will always produce different hash outputs?

A) Key exchange
B) Collision resistance
C) Symmetric encryption
D) Cipher block chaining

Answer: B) Collision resistance

Explanation: Collision resistance ensures that no two different inputs will generate the same cryptographic hash output, preventing hash collisions.


Question 87

Which encryption method is used to protect DNS queries from interception and manipulation?

A) SSL
B) DNSSEC
C) SHA-1
D) RSA-1024

Answer: B) DNSSEC

Explanation: DNS Security Extensions (DNSSEC) provide authentication and integrity protection for DNS responses, preventing attacks like DNS spoofing.


Question 88

Which cryptographic function is best suited for ensuring message authenticity?

A) Hashing with SHA-256
B) AES encryption
C) HMAC (Hashed Message Authentication Code)
D) Public key encryption

Answer: C) HMAC (Hashed Message Authentication Code)

Explanation: HMAC provides message integrity and authenticity, ensuring that messages are not tampered with during transmission.


Question 89

Which cryptographic vulnerability allows attackers to recover encryption keys by analyzing power consumption?

A) Chosen plaintext attack
B) Power analysis attack
C) Meet-in-the-middle attack
D) Rainbow table attack

Answer: B) Power analysis attack

Explanation: Power analysis attacks (a type of side-channel attack) analyze power fluctuations during encryption operations to infer encryption keys.


Question 90

Which cryptographic principle ensures that an attacker cannot reverse one-way hash functions?

A) Avalanche effect
B) Key stretching
C) Pre-image resistance
D) Asymmetric encryption

Answer: C) Pre-image resistance

Explanation: Pre-image resistance ensures that a hash function cannot be reversed to recover the original input, making it secure against brute-force attempts.


Question 91

Which cryptographic technique is used to verify a file’s authenticity and integrity?

A) Symmetric encryption
B) Digital signatures
C) Stream cipher encryption
D) Base64 encoding

Answer: B) Digital signatures

Explanation: Digital signatures use a cryptographic hash and public-key encryption to ensure file authenticity and integrity, preventing tampering.


Question 92

Which of the following is a widely used key-exchange protocol for encrypted communications?

A) RSA
B) AES
C) Diffie-Hellman
D) MD5

Answer: C) Diffie-Hellman

Explanation: Diffie-Hellman enables secure key exchange over an insecure network, allowing parties to establish shared encryption keys without direct transmission.


Question 93

Which encryption mode is recommended to prevent bit-flipping attacks?

A) AES-ECB
B) AES-CBC
C) AES-GCM
D) AES-OFB

Answer: C) AES-GCM

Explanation: AES-GCM (Galois/Counter Mode) provides both encryption and authentication, preventing tampering and bit-flipping attacks.


Question 94

Which attack method involves attempting all possible encryption keys until the correct one is found?

A) Chosen ciphertext attack
B) Brute-force attack
C) Side-channel attack
D) Man-in-the-middle attack

Answer: B) Brute-force attack

Explanation: Brute-force attacks try all possible encryption keys to decrypt ciphertext, making longer key lengths more secure against such attacks.


Question 95

Which hashing algorithm is considered quantum-resistant?

A) SHA-1
B) MD5
C) SHA-3
D) RSA

Answer: C) SHA-3

Explanation: SHA-3 is a secure hashing function resistant to quantum computing attacks, unlike SHA-1 and MD5, which are vulnerable to collisions.


Question 96

Which of the following is a common weakness of improper JWT (JSON Web Token) implementation?

A) Using AES instead of RSA
B) Using weak JWT secret keys
C) Storing tokens in HTTP headers
D) Signing tokens with SHA-256

Answer: B) Using weak JWT secret keys

Explanation: Weak JWT secret keys allow attackers to forge tokens, bypassing authentication. Strong, unpredictable keys should always be used.


Question 97

Which cryptographic function is used in Bitcoin mining?

A) RSA-2048
B) SHA-256
C) AES-GCM
D) Diffie-Hellman

Answer: B) SHA-256

Explanation: SHA-256 is used in Bitcoin mining to hash transactions securely and create proof-of-work puzzles.


Question 98

Which of the following encryption algorithms is most efficient for encrypting small amounts of data?

A) RSA
B) AES-GCM
C) ECC
D) Blowfish

Answer: C) ECC

Explanation: Elliptic Curve Cryptography (ECC) provides strong encryption with shorter key sizes, making it efficient for small data encryption and key exchange.


Question 99

What is the biggest security risk of using self-signed SSL certificates?

A) They provide stronger encryption than CA-signed certificates
B) They do not support forward secrecy
C) They are not trusted by browsers, making MITM attacks easier
D) They use weaker encryption algorithms

Answer: C) They are not trusted by browsers, making MITM attacks easier

Explanation: Self-signed SSL certificates are not trusted by browsers, allowing attackers to impersonate servers and intercept communications (MITM attack).


Question 100

Which cryptographic function is best suited for generating unique session tokens?

A) SHA-1
B) MD5
C) HMAC with a secure random seed
D) Base64 encoding

Answer: C) HMAC with a secure random seed

Explanation: HMAC with a secure random seed generates unique, tamper-resistant session tokens, ensuring authentication security.


Question 101

Which of the following encryption algorithms is considered deprecated and insecure?

A) AES-256
B) RC4
C) RSA-4096
D) ChaCha20

Answer: B) RC4

Explanation: RC4 has known vulnerabilities such as biases in keystream output, making it insecure for modern cryptographic applications.


Question 102

Which property of hashing algorithms ensures that two different inputs do not produce the same hash?

A) Avalanche effect
B) Key stretching
C) Collision resistance
D) Block chaining

Answer: C) Collision resistance

Explanation: Collision resistance ensures that no two different inputs produce the same hash output, preventing hash collisions.


Question 103

Which encryption method is used in WPA3 for securing Wi-Fi networks?

A) AES-GCM
B) RSA
C) Blowfish
D) MD5

Answer: A) AES-GCM

Explanation: AES-GCM is used in WPA3, providing secure Wi-Fi encryption with authentication to prevent eavesdropping and brute-force attacks.


Question 104

Which of the following techniques prevents replay attacks in cryptographic communications?

A) Using Base64 encoding
B) Using a nonce or timestamp
C) Encrypting data with AES
D) Using weak passwords

Answer: B) Using a nonce or timestamp

Explanation: Nonces and timestamps prevent replay attacks by ensuring that messages are used only once and have a limited validity period.


Question 105

Which property of cryptographic functions ensures data integrity?

A) Confidentiality
B) Symmetric encryption
C) Non-repudiation
D) Hashing

Answer: D) Hashing

Explanation: Hashing provides data integrity by producing a fixed-length output that uniquely represents input data, preventing unauthorized modifications.


Question 106

Which encryption scheme is used in secure hardware modules like TPM (Trusted Platform Module)?

A) AES-ECB
B) RSA and ECC
C) Blowfish
D) SHA-1

Answer: B) RSA and ECC

Explanation: TPMs use RSA and ECC for secure key storage and cryptographic operations, ensuring hardware-level security.


Question 107

Which security measure should be avoided when generating cryptographic keys?

A) Using a hardware-based random number generator
B) Using rand() from standard libraries
C) Using a cryptographically secure pseudo-random number generator (CSPRNG)
D) Using entropy sources from the operating system

Answer: B) Using rand() from standard libraries

Explanation: Standard rand() functions are not cryptographically secure, making them unsuitable for key generation.


Question 108

Which of the following is not an encryption algorithm?

A) SHA-256
B) AES
C) RSA
D) Blowfish

Answer: A) SHA-256

Explanation: SHA-256 is a hashing algorithm, not an encryption algorithm. Hashing is one-way and cannot be decrypted.


Question 109

Which encryption mode is best suited for database field encryption?

A) AES-ECB
B) AES-GCM
C) RC4
D) MD5

Answer: B) AES-GCM

Explanation: AES-GCM provides authenticated encryption, making it ideal for securing database fields and preventing unauthorized modifications.


Question 110

Which attack technique exploits improperly implemented public key infrastructure (PKI)?

A) Padding oracle attack
B) Certificate spoofing attack
C) Man-in-the-middle attack
D) Timing attack

Answer: B) Certificate spoofing attack

Explanation: Certificate spoofing attacks exploit weaknesses in PKI and allow attackers to forge SSL/TLS certificates, leading to impersonation and MITM attacks.


Question 111

Which of the following is a lightweight cryptographic algorithm designed specifically for IoT devices?

A) RSA
B) AES-GCM
C) Speck
D) SHA-256

Answer: C) Speck

Explanation: Speck is a lightweight block cipher designed for low-power devices, such as IoT, providing efficient encryption with minimal computational overhead.


Question 112

Which attack method is used to recover an RSA private key by analyzing the decryption process?

A) Side-channel attack
B) Frequency analysis attack
C) Rainbow table attack
D) Known plaintext attack

Answer: A) Side-channel attack

Explanation: Side-channel attacks exploit physical characteristics (power usage, timing, or EM emissions) during RSA decryption to extract private keys.


Question 113

Which of the following cryptographic attacks is specific to Elliptic Curve Cryptography (ECC)?

A) Pollard’s rho method
B) Man-in-the-middle attack
C) Padding oracle attack
D) Meet-in-the-middle attack

Answer: A) Pollard’s rho method

Explanation: Pollard’s rho method is an attack used to solve the discrete logarithm problem in Elliptic Curve Cryptography (ECC), attempting to break its security.


Question 114

Which encryption algorithm is commonly used for securing VoIP communications?

A) AES-GCM
B) RC4
C) SRTP (Secure Real-time Transport Protocol)
D) Blowfish

Answer: C) SRTP (Secure Real-time Transport Protocol)

Explanation: SRTP encrypts VoIP and real-time audio/video communications, ensuring low latency and secure data transmission.


Question 115

Which of the following describes hash length extension attacks?

A) Attacks where an attacker extends the length of a key
B) Attacks where an attacker appends data to a hashed message and forges a valid hash
C) Attacks where a hash function produces too short an output
D) Attacks where a hash function is used without a salt

Answer: B) Attacks where an attacker appends data to a hashed message and forges a valid hash

Explanation: Hash length extension attacks allow attackers to add data to a hash without knowing the original message, particularly affecting Merkle-Damgård hash functions (e.g., MD5, SHA-1).


Question 116

Which cryptographic function is used in secure boot processes to verify firmware integrity?

A) RSA encryption
B) Digital signatures
C) AES-GCM encryption
D) MD5 hashing

Answer: B) Digital signatures

Explanation: Digital signatures ensure that firmware in secure boot processes has not been modified or tampered with, preventing unauthorized code execution.


Question 117

Which of the following is a primary security concern when implementing hardware-based encryption?

A) Key management
B) Encryption algorithm efficiency
C) Latency issues
D) Network bandwidth

Answer: A) Key management

Explanation: Key management is a major concern in hardware-based encryption because losing or exposing encryption keys can lead to irreversible data loss.


Question 118

Which of the following is not a recommended practice for cryptographic key storage?

A) Using a dedicated Hardware Security Module (HSM)
B) Storing keys in environment variables
C) Hardcoding keys in the source code
D) Using a cloud-based key management service (KMS)

Answer: C) Hardcoding keys in the source code

Explanation: Hardcoding encryption keys in the source code is a critical security risk, as attackers can extract and misuse them.


Question 119

Which of the following is an advantage of using Authenticated Encryption with Associated Data (AEAD)?

A) It prevents brute-force attacks
B) It allows encryption without a key
C) It provides both encryption and integrity verification
D) It increases key entropy

Answer: C) It provides both encryption and integrity verification

Explanation: AEAD (Authenticated Encryption with Associated Data) ensures both confidentiality (encryption) and integrity (authentication), preventing ciphertext tampering.


Question 120

Which attack exploits timing variations in cryptographic operations to extract encryption keys?

A) Rainbow table attack
B) Power analysis attack
C) Timing attack
D) Differential cryptanalysis

Answer: C) Timing attack

Explanation: Timing attacks analyze how long cryptographic operations take, allowing attackers to infer private keys in RSA, ECC, and AES implementations.


Question 121

Which cryptographic function is best suited for protecting API secrets?

A) MD5 hashing
B) AES-GCM encryption
C) Base64 encoding
D) XOR encryption

Answer: B) AES-GCM encryption

Explanation: AES-GCM provides strong encryption and integrity verification, making it ideal for securing API keys and secrets.


Question 122

Which of the following cryptographic attacks exploits weak implementations of RSA padding?

A) Brute-force attack
B) Chosen ciphertext attack
C) Side-channel attack
D) Meet-in-the-middle attack

Answer: B) Chosen ciphertext attack

Explanation: Chosen ciphertext attacks (CCA), such as Bleichenbacher’s attack, exploit weak RSA padding schemes, leading to decryption without knowing the private key.


Question 123

What is the primary purpose of elliptic curve cryptography (ECC)?

A) Encrypting data efficiently
B) Generating hash values
C) Providing strong encryption with shorter key sizes
D) Protecting against brute-force attacks

Answer: C) Providing strong encryption with shorter key sizes

Explanation: ECC provides the same level of security as RSA but with smaller keys, making it ideal for resource-constrained environments.


Question 124

Which key exchange protocol is used in TLS 1.3 to improve security and efficiency?

A) Static RSA key exchange
B) Static Diffie-Hellman
C) Ephemeral Elliptic Curve Diffie-Hellman (ECDHE)
D) MD5-based key derivation

Answer: C) Ephemeral Elliptic Curve Diffie-Hellman (ECDHE)

Explanation: ECDHE provides perfect forward secrecy (PFS) in TLS 1.3, making encrypted sessions secure even if long-term keys are compromised.


Question 125

Which hashing algorithm is best suited for verifying file integrity?

A) MD5
B) SHA-256
C) AES-256
D) RSA

Answer: B) SHA-256

Explanation: SHA-256 is a cryptographic hashing algorithm designed to ensure file integrity by detecting any modifications to the original data.


Question 126

Which cryptographic vulnerability exploits predictable IVs in block cipher encryption?

A) Chosen plaintext attack
B) Ciphertext pattern analysis
C) Padding oracle attack
D) Replay attack

Answer: B) Ciphertext pattern analysis

Explanation: Predictable IVs allow attackers to detect patterns in block ciphers, leading to potential decryption attacks.


Question 127

Which cryptographic function is best for securing biometric data?

A) Plaintext storage
B) Symmetric encryption with AES
C) Secure hashing with salting (SHA-3 + salt)
D) Base64 encoding

Answer: C) Secure hashing with salting (SHA-3 + salt)

Explanation: Hashing with a salt prevents biometric data from being reversed or exposed, ensuring secure storage.


Question 128

Which cryptographic algorithm is commonly used for password-based encryption (PBE)?

A) RSA
B) PBKDF2
C) SHA-256
D) Diffie-Hellman

Answer: B) PBKDF2

Explanation: PBKDF2 applies multiple hashing iterations to derive strong encryption keys from passwords, improving security.


Question 129

Which of the following is a zero-trust security principle in cryptographic systems?

A) Encrypting only sensitive data
B) Assuming all networks and devices are untrusted
C) Using only symmetric encryption
D) Allowing unrestricted access to encrypted files

Answer: B) Assuming all networks and devices are untrusted

Explanation: Zero-trust security assumes that no user, network, or device should be automatically trusted, requiring continuous authentication and encryption.


Question 130

What is the primary advantage of using Ephemeral Diffie-Hellman (DHE) over Static Diffie-Hellman?

A) It speeds up encryption processes
B) It provides Perfect Forward Secrecy (PFS)
C) It allows for asymmetric encryption
D) It reduces computational complexity

Answer: B) It provides Perfect Forward Secrecy (PFS)

Explanation: Ephemeral Diffie-Hellman (DHE or ECDHE) generates a new session key for each communication session, ensuring that past encrypted sessions remain secure even if private keys are compromised.


Question 131

Which cryptographic attack relies on analyzing multiple ciphertexts that use the same encryption key?

A) Frequency analysis attack
B) Chosen plaintext attack
C) Known-key attack
D) Ciphertext-only attack

Answer: D) Ciphertext-only attack

Explanation: Ciphertext-only attacks analyze patterns in multiple ciphertexts encrypted with the same key to infer information about the plaintext.


Question 132

Which encryption algorithm is optimized for lightweight applications in mobile and embedded systems?

A) AES
B) RSA
C) ChaCha20
D) SHA-512

Answer: C) ChaCha20

Explanation: ChaCha20 is a stream cipher designed for high performance and security, making it suitable for mobile and embedded systems with low processing power.


Question 133

Which cryptographic technique helps verify software integrity before execution?

A) Encrypting the software
B) Digital signatures
C) Base64 encoding
D) Asymmetric key exchange

Answer: B) Digital signatures

Explanation: Digital signatures ensure that software has not been tampered with, verifying its authenticity before execution.


Question 134

Which of the following is a best practice for key rotation?

A) Changing keys only if compromised
B) Changing encryption keys at regular intervals
C) Hardcoding keys in the source code
D) Using the same key for multiple encryption purposes

Answer: B) Changing encryption keys at regular intervals

Explanation: Regular key rotation minimizes security risks by limiting the exposure window of encryption keys in case of compromise.


Question 135

Which cryptographic algorithm is most commonly used in electronic passports (ePassports)?

A) RSA
B) AES-GCM
C) ECDSA
D) SHA-1

Answer: C) ECDSA

Explanation: Elliptic Curve Digital Signature Algorithm (ECDSA) is widely used in ePassports to provide strong authentication while maintaining efficiency.


Question 136

Which type of cryptographic attack specifically targets incorrect implementations of padding schemes?

A) Brute-force attack
B) Padding oracle attack
C) Side-channel attack
D) Replay attack

Answer: B) Padding oracle attack

Explanation: Padding oracle attacks exploit vulnerabilities in padding schemes (e.g., PKCS#7 padding) by analyzing error messages from decryption failures.


Question 137

Which of the following is an important consideration when implementing Transport Layer Security (TLS)?

A) Using self-signed certificates for production systems
B) Disabling support for outdated protocols like TLS 1.0 and 1.1
C) Using MD5 for digital signatures
D) Allowing weak ciphers for backward compatibility

Answer: B) Disabling support for outdated protocols like TLS 1.0 and 1.1

Explanation: TLS 1.0 and 1.1 are considered insecure due to vulnerabilities like BEAST and POODLE attacks, so they should be disabled in favor of TLS 1.2 or TLS 1.3.


Question 138

Which cryptographic concept ensures that a given plaintext will produce different ciphertexts each time it is encrypted?

A) Key stretching
B) Nonce or Initialization Vector (IV)
C) Asymmetric encryption
D) Hashing

Answer: B) Nonce or Initialization Vector (IV)

Explanation: Nonces and IVs introduce randomness in encryption, ensuring that the same plaintext produces different ciphertexts each time it is encrypted.


Question 139

Which of the following is a quantum-safe cryptographic technique?

A) ECC (Elliptic Curve Cryptography)
B) RSA-4096
C) Lattice-based cryptography
D) SHA-256

Answer: C) Lattice-based cryptography

Explanation: Lattice-based cryptography is considered resistant to quantum attacks, whereas RSA and ECC can be broken using quantum computing techniques like Shor’s algorithm.


Question 140

Which attack exploits the ability to modify intercepted encrypted messages without decryption?

A) Chosen ciphertext attack
B) Man-in-the-middle attack
C) Bit-flipping attack
D) Hash collision attack

Answer: C) Bit-flipping attack

Explanation: Bit-flipping attacks modify ciphertext directly without decryption, often exploiting weaknesses in unauthenticated encryption modes like AES-CBC.


Question 141

Which encryption algorithm is most commonly used for end-to-end encrypted messaging applications like Signal?

A) RSA
B) AES-CBC
C) Double Ratchet Algorithm (X3DH + AES-GCM)
D) DES

Answer: C) Double Ratchet Algorithm (X3DH + AES-GCM)

Explanation: The Double Ratchet Algorithm (used in Signal Protocol) combines X3DH key exchange and AES-GCM encryption for end-to-end secure messaging.


Question 142

Which of the following helps prevent side-channel attacks in cryptographic implementations?

A) Using weak keys
B) Introducing timing variations in encryption operations
C) Implementing constant-time cryptographic operations
D) Using long key sizes

Answer: C) Implementing constant-time cryptographic operations

Explanation: Constant-time cryptographic operations prevent timing-based attacks, making it harder for attackers to analyze execution patterns.


Question 143

Which cryptographic attack exploits weaknesses in PRNG (Pseudo-Random Number Generators)?

A) Replay attack
B) Predictable key attack
C) Birthday attack
D) Side-channel attack

Answer: B) Predictable key attack

Explanation: Weak or predictable PRNGs can lead to cryptographic key compromises, allowing attackers to reconstruct encryption keys.


Question 144

Which of the following cryptographic protocols is designed for anonymous and private web browsing?

A) TLS
B) PGP
C) Tor (The Onion Routing)
D) Diffie-Hellman

Answer: C) Tor (The Onion Routing)

Explanation: Tor encrypts internet traffic and routes it through multiple nodes, providing anonymity and privacy for web browsing.


Question 145

Which cryptographic function is best suited for securing stored credit card numbers?

A) SHA-256 hashing
B) AES encryption
C) Base64 encoding
D) MD5 hashing

Answer: B) AES encryption

Explanation: AES encryption ensures that stored credit card numbers remain secure, whereas hashing is not suitable since encrypted data needs to be retrievable.


Question 146

Which cryptographic algorithm is commonly used for securing mobile payment transactions (e.g., Apple Pay, Google Pay)?

A) RSA
B) AES-GCM
C) ECC (Elliptic Curve Cryptography)
D) DES

Answer: C) ECC (Elliptic Curve Cryptography)

Explanation: ECC is widely used in mobile payment systems due to its ability to provide strong encryption with shorter key sizes, making it ideal for fast and secure transactions.


Question 147

Which of the following is not a suitable method for securely storing user passwords?

A) Using PBKDF2 with a salt
B) Hashing with bcrypt
C) Storing passwords in plaintext
D) Using Argon2

Answer: C) Storing passwords in plaintext

Explanation: Passwords should never be stored in plaintext. Instead, secure password hashing algorithms like PBKDF2, bcrypt, or Argon2 should be used.


Question 148

What is the biggest weakness of using MD5 for cryptographic hashing?

A) It is too fast
B) It produces too large a hash output
C) It is vulnerable to collision attacks
D) It requires too much processing power

Answer: C) It is vulnerable to collision attacks

Explanation: MD5 is insecure because attackers can generate two different inputs that produce the same hash value (collision), making it unsuitable for cryptographic security.


Question 149

Which attack attempts to recover an encryption key by analyzing small statistical variations in cryptographic operations?

A) Brute-force attack
B) Power analysis attack
C) Frequency analysis attack
D) Meet-in-the-middle attack

Answer: B) Power analysis attack

Explanation: Power analysis attacks (a type of side-channel attack) analyze power consumption patterns during encryption operations to extract cryptographic keys.


Question 150

Which of the following is an important security consideration when implementing JWT (JSON Web Tokens)?

A) Using HS256 instead of RS256
B) Allowing JWTs to be used indefinitely
C) Verifying the JWT signature before trusting the data
D) Using a static secret key for all JWTs

Answer: C) Verifying the JWT signature before trusting the data

Explanation: JWTs must always be verified using their signature to prevent attacks like forged tokens or tampering.


Question 151

Which protocol is used for securing domain name system (DNS) queries to prevent eavesdropping?

A) DNS over HTTPS (DoH)
B) RC4
C) Diffie-Hellman
D) SSL

Answer: A) DNS over HTTPS (DoH)

Explanation: DNS over HTTPS (DoH) encrypts DNS queries, preventing attackers from intercepting and manipulating domain name lookups.


Question 152

Which of the following is a known weakness of symmetric encryption?

A) Key exchange difficulty
B) It is slower than asymmetric encryption
C) It cannot encrypt large amounts of data
D) It is vulnerable to chosen ciphertext attacks

Answer: A) Key exchange difficulty

Explanation: Symmetric encryption requires both parties to securely share a secret key, which is a major challenge compared to asymmetric encryption.


Question 153

Which cryptographic principle ensures that previously encrypted messages remain secure even if a private key is later compromised?

A) Non-repudiation
B) Perfect Forward Secrecy (PFS)
C) Hashing
D) AES encryption

Answer: B) Perfect Forward Secrecy (PFS)

Explanation: PFS ensures that session keys are unique for each session, preventing past communications from being decrypted if a long-term key is compromised.


Question 154

Which cryptographic algorithm is primarily used for hardware-based security modules like TPM (Trusted Platform Module)?

A) RSA and AES
B) MD5
C) SHA-1
D) Base64

Answer: A) RSA and AES

Explanation: TPMs use RSA and AES for secure cryptographic key storage and encryption in hardware-based security modules.


Question 155

What is the primary benefit of using an HMAC (Hashed Message Authentication Code)?

A) It provides non-repudiation
B) It encrypts data at rest
C) It ensures message integrity and authentication
D) It generates encryption keys

Answer: C) It ensures message integrity and authentication

Explanation: HMAC combines hashing with a secret key to provide message integrity and authenticity, preventing tampering during transmission.


Question 156

Which of the following should not be used as a cryptographic random number generator?

A) /dev/random (Linux)
B) /dev/urandom (Linux)
C) Cryptographically secure PRNG (CSPRNG)
D) rand() from standard libraries

Answer: D) rand() from standard libraries

Explanation: Standard rand() functions are not cryptographically secure and should never be used for generating encryption keys or sensitive data.


Question 157

Which cryptographic technique ensures a message cannot be modified without detection?

A) Base64 encoding
B) HMAC (Hashed Message Authentication Code)
C) Symmetric encryption
D) RSA encryption

Answer: B) HMAC (Hashed Message Authentication Code)

Explanation: HMAC ensures message integrity by detecting unauthorized modifications using a combination of hashing and a secret key.


Question 158

Which encryption scheme is used in secure password storage to make brute-force attacks computationally expensive?

A) SHA-256
B) PBKDF2
C) Base64 encoding
D) AES-128

Answer: B) PBKDF2

Explanation: PBKDF2 (Password-Based Key Derivation Function 2) is used to slow down brute-force attacks by adding computational complexity to password hashing.


Question 159

Which of the following is a major disadvantage of asymmetric encryption compared to symmetric encryption?

A) It requires a shared secret key
B) It is significantly slower than symmetric encryption
C) It cannot be used for key exchange
D) It is vulnerable to brute-force attacks

Answer: B) It is significantly slower than symmetric encryption

Explanation: Asymmetric encryption (e.g., RSA, ECC) is computationally expensive compared to symmetric encryption (e.g., AES), making it slower for encrypting large amounts of data.


Question 160

Which of the following cryptographic techniques protects data from being modified in transit?

A) AES-CBC encryption
B) Digital signatures
C) Base64 encoding
D) DES encryption

Answer: B) Digital signatures

Explanation: Digital signatures ensure data integrity and authenticity, protecting messages from being altered in transit.


Question 161

Which of the following is an advantage of using Elliptic Curve Cryptography (ECC) over RSA?

A) ECC keys require longer key lengths than RSA
B) ECC provides the same level of security with smaller key sizes
C) ECC is only used for hashing
D) ECC does not require public-private key pairs

Answer: B) ECC provides the same level of security with smaller key sizes

Explanation: ECC is more efficient than RSA because it provides the same level of security with much shorter keys, making it ideal for mobile and embedded systems.


Question 162

Which cryptographic attack targets a vulnerability in key generation when using weak random number generators?

A) Brute-force attack
B) Predictable key attack
C) Ciphertext-only attack
D) Padding oracle attack

Answer: B) Predictable key attack

Explanation: Weak or predictable random number generators (PRNGs) can lead to guessable cryptographic keys, allowing attackers to break encryption schemes.


Question 163

Which encryption technique is most suitable for protecting large volumes of data at rest?

A) RSA
B) AES-XTS
C) SHA-256
D) ECC

Answer: B) AES-XTS

Explanation: AES-XTS (XEX-based Tweaked CodeBook Mode with Ciphertext Stealing) is optimized for encrypting large amounts of data at rest, such as full-disk encryption.


Question 164

Which of the following encryption modes provides built-in authentication?

A) ECB
B) CBC
C) GCM
D) OFB

Answer: C) GCM

Explanation: AES-GCM (Galois/Counter Mode) provides both encryption and authentication, preventing tampering and ensuring data integrity.


Question 165

Which of the following is a recommended practice when implementing cryptographic key management?

A) Hardcoding encryption keys in the source code
B) Using a dedicated key management system (KMS)
C) Using the same key for multiple encryption purposes
D) Storing encryption keys alongside encrypted data

Answer: B) Using a dedicated key management system (KMS)

Explanation: Key management systems (KMS) help securely store, manage, and rotate encryption keys, preventing unauthorized access.


Question 166

What is the primary reason RSA key lengths must be significantly longer than AES key lengths for equivalent security?

A) RSA is symmetric, requiring longer keys
B) RSA keys are more efficient than AES keys
C) RSA security relies on prime factorization, which requires longer keys
D) RSA keys are weaker due to poor random number generation

Answer: C) RSA security relies on prime factorization, which requires longer keys

Explanation: RSA’s security depends on the difficulty of factoring large prime numbers, requiring longer key lengths (e.g., RSA-2048) to achieve the same security as a shorter AES key (e.g., AES-128).


Question 167

Which of the following cryptographic vulnerabilities allows an attacker to forge a digital signature without knowing the private key?

A) Padding oracle attack
B) Weak hash collision attack
C) Key stretching attack
D) Timing attack

Answer: B) Weak hash collision attack

Explanation: Weak hash functions (e.g., MD5, SHA-1) are vulnerable to collision attacks, allowing attackers to generate different inputs with the same hash value and forge digital signatures.


Question 168

Which cryptographic principle ensures a system remains secure even if attackers gain access to partial data?

A) Non-repudiation
B) Defense-in-depth
C) Information-theoretic security
D) Perfect secrecy

Answer: D) Perfect secrecy

Explanation: Perfect secrecy, as defined in Shannon’s theorem, ensures that encrypted data provides no information about the original plaintext, even if some ciphertext is exposed.


Question 169

Which type of attack exploits reused IVs (Initialization Vectors) in encryption schemes?

A) Brute-force attack
B) Chosen plaintext attack
C) Replay attack
D) Ciphertext pattern analysis attack

Answer: D) Ciphertext pattern analysis attack

Explanation: Reusing IVs in encryption modes like AES-CBC can expose patterns in ciphertext, leading to ciphertext pattern analysis attacks.


Question 170

Which of the following cryptographic protocols is commonly used to protect email communications?

A) SSH
B) PGP/GPG
C) AES-CBC
D) Blowfish

Answer: B) PGP/GPG

Explanation: Pretty Good Privacy (PGP) and its open-source alternative GPG are used to encrypt and sign emails, ensuring confidentiality and authenticity.


Question 171

Which encryption algorithm is commonly used in end-to-end encrypted cloud storage services?

A) RSA-1024
B) AES-GCM
C) MD5
D) DES

Answer: B) AES-GCM

Explanation: AES-GCM is widely used in cloud storage encryption due to its efficiency and built-in authentication, ensuring both data confidentiality and integrity.


Question 172

Which attack method involves using precomputed hash values to crack password hashes?

A) Dictionary attack
B) Rainbow table attack
C) Meet-in-the-middle attack
D) Replay attack

Answer: B) Rainbow table attack

Explanation: Rainbow tables store precomputed hash values to efficiently crack password hashes, making them a major threat to weakly hashed passwords.


Question 173

Which cryptographic attack exploits timing variations in operations to infer encryption keys?

A) Man-in-the-middle attack
B) Side-channel attack
C) Chosen ciphertext attack
D) Bit-flipping attack

Answer: B) Side-channel attack

Explanation: Side-channel attacks analyze external information, such as execution time, power consumption, or electromagnetic radiation, to extract cryptographic keys.


Question 174

Which type of cryptographic function is most resistant to quantum computing attacks?

A) RSA
B) AES
C) Lattice-based cryptography
D) SHA-1

Answer: C) Lattice-based cryptography

Explanation: Lattice-based cryptography is considered resistant to quantum computing attacks, unlike RSA and ECC, which can be broken using Shor’s algorithm.


Question 175

Which security feature of TLS 1.3 enhances privacy and forward secrecy?

A) Use of static RSA keys
B) Removal of weaker encryption ciphers
C) Inclusion of SSLv3 fallback
D) Using MD5 for message authentication

Answer: B) Removal of weaker encryption ciphers

Explanation: TLS 1.3 removed weak cipher suites, relying only on strong encryption protocols (e.g., AES-GCM, ChaCha20) and ensuring perfect forward secrecy.


Question 176

Which of the following is a secure method for generating encryption keys?

A) Using the output of rand() in C
B) Using a cryptographically secure pseudo-random number generator (CSPRNG)
C) Using a hardcoded passphrase
D) Generating a key from a user’s birthdate

Answer: B) Using a cryptographically secure pseudo-random number generator (CSPRNG)

Explanation: CSPRNGs generate strong, unpredictable keys suitable for cryptographic applications, preventing key compromise.


Question 177

Which cryptographic algorithm is commonly used in blockchain mining?

A) AES-GCM
B) SHA-256
C) Blowfish
D) Diffie-Hellman

Answer: B) SHA-256

Explanation: SHA-256 is used in Bitcoin mining to hash transaction blocks securely and generate proof-of-work puzzles.


Question 178

Which cryptographic attack targets a weakness in RSA’s padding scheme and can lead to key recovery?

A) Chosen ciphertext attack
B) Brute-force attack
C) Padding oracle attack
D) Birthday attack

Answer: A) Chosen ciphertext attack

Explanation: Bleichenbacher’s attack, a form of chosen ciphertext attack, exploits weak RSA padding (PKCS#1 v1.5), allowing an attacker to decrypt messages without knowing the private key.


Question 179

Which property of hash functions ensures that a small change in input results in a drastically different output?

A) Non-repudiation
B) Collision resistance
C) Avalanche effect
D) Key stretching

Answer: C) Avalanche effect

Explanation: The avalanche effect ensures that even a slight change in the input completely changes the hash output, making hash functions resistant to minor alterations.


Question 180

Which cryptographic technique allows one party to prove knowledge of a secret without revealing the secret itself?

A) Public-key encryption
B) Zero-Knowledge Proof (ZKP)
C) Digital signatures
D) Symmetric encryption

Answer: B) Zero-Knowledge Proof (ZKP)

Explanation: Zero-Knowledge Proof (ZKP) enables a party to prove knowledge of a secret without revealing it, commonly used in blockchain privacy solutions.


Question 181

Which key derivation function is most resistant to GPU-based password cracking?

A) SHA-256
B) MD5
C) Argon2
D) PBKDF2

Answer: C) Argon2

Explanation: Argon2 is designed to be memory-hard, making it highly resistant to GPU-based and parallel password cracking attacks.


Question 182

Which of the following hashing algorithms is not recommended for password hashing due to its speed?

A) Argon2
B) SHA-1
C) bcrypt
D) PBKDF2

Answer: B) SHA-1

Explanation: SHA-1 is too fast for password hashing, making it vulnerable to brute-force attacks. bcrypt, Argon2, and PBKDF2 are better choices.


Question 183

Which attack is used to break weak cryptographic hash functions by finding two inputs that produce the same hash?

A) Brute-force attack
B) Collision attack
C) Key recovery attack
D) Side-channel attack

Answer: B) Collision attack

Explanation: Collision attacks occur when two different inputs produce the same hash output, compromising hash integrity (e.g., MD5 and SHA-1 vulnerabilities).


Question 184

Which cryptographic algorithm is considered quantum-resistant and is being researched for future encryption standards?

A) RSA
B) ECC
C) Lattice-based cryptography
D) SHA-256

Answer: C) Lattice-based cryptography

Explanation: Lattice-based cryptography is one of the leading quantum-resistant cryptographic techniques, unlike RSA and ECC, which are vulnerable to quantum attacks.


Question 185

Which cryptographic attack can be prevented by implementing constant-time cryptographic operations?

A) Brute-force attack
B) Timing attack
C) Replay attack
D) Hash collision attack

Answer: B) Timing attack

Explanation: Timing attacks analyze execution time variations in cryptographic operations to extract sensitive data. Using constant-time execution mitigates this risk.


Question 186

Which encryption mode should never be used due to its vulnerability to ciphertext pattern analysis?

A) ECB (Electronic Codebook)
B) CBC (Cipher Block Chaining)
C) GCM (Galois Counter Mode)
D) CTR (Counter Mode)

Answer: A) ECB (Electronic Codebook)

Explanation: ECB mode encrypts identical plaintext blocks into identical ciphertext blocks, making it vulnerable to pattern analysis attacks.


Question 187

Which cryptographic technique is used in blockchain technology to create a verifiable proof of transaction authenticity?

A) AES
B) Digital signatures
C) Symmetric encryption
D) MD5

Answer: B) Digital signatures

Explanation: Blockchain transactions use digital signatures (e.g., ECDSA) to ensure that only authorized users can approve transactions.


Question 188

Which encryption algorithm is commonly used in mobile payment and contactless transactions?

A) RSA-1024
B) ECC (Elliptic Curve Cryptography)
C) SHA-1
D) DES

Answer: B) ECC (Elliptic Curve Cryptography)

Explanation: ECC provides strong encryption with shorter key lengths, making it ideal for secure mobile and NFC (Near Field Communication) payments.


Question 189

Which cryptographic attack involves modifying encrypted data without decrypting it, exploiting weak encryption schemes?

A) Bit-flipping attack
B) Brute-force attack
C) Dictionary attack
D) Key recovery attack

Answer: A) Bit-flipping attack

Explanation: Bit-flipping attacks allow an attacker to modify encrypted ciphertext in a way that results in controlled changes to the decrypted plaintext.


Question 190

Which cryptographic principle states that an attacker should gain no useful information from intercepted ciphertext, even with unlimited computational power?

A) Forward secrecy
B) Kerckhoffs’s principle
C) Perfect secrecy
D) Non-repudiation

Answer: C) Perfect secrecy

Explanation: Perfect secrecy, as defined by Shannon’s theorem, ensures that ciphertext reveals no information about the original plaintext, even if an attacker has infinite computational resources.


Question 191

Which of the following cryptographic algorithms is used for fast symmetric encryption in secure network protocols like WireGuard?

A) AES-CBC
B) ChaCha20
C) RSA-4096
D) SHA-512

Answer: B) ChaCha20

Explanation: ChaCha20 is a stream cipher optimized for high-speed encryption and security, often used in VPNs and secure network protocols like WireGuard.


Question 192

Which property of digital signatures ensures that a sender cannot deny sending a message?

A) Confidentiality
B) Non-repudiation
C) Integrity
D) Key exchange

Answer: B) Non-repudiation

Explanation: Non-repudiation ensures that a sender cannot falsely deny having sent a digitally signed message, as the signature uniquely identifies them.


Question 193

Which of the following is an advantage of using AES-GCM over AES-CBC?

A) AES-GCM requires a shorter key length
B) AES-GCM provides built-in authentication
C) AES-CBC is faster for encrypting large data
D) AES-GCM is only used for password hashing

Answer: B) AES-GCM provides built-in authentication

Explanation: AES-GCM includes integrity and authentication features, making it more secure than AES-CBC, which requires separate authentication mechanisms.


Question 194

Which cryptographic algorithm is used in Secure Shell (SSH) for secure remote access?

A) RSA
B) DES
C) MD5
D) Blowfish

Answer: A) RSA

Explanation: SSH (Secure Shell) uses RSA, ECDSA, or Ed25519 for authentication and key exchange, securing remote access sessions.


Question 195

Which of the following best describes key stretching in cryptography?

A) Extending the length of a public key for additional security
B) Strengthening weak passwords by increasing computational cost
C) Using longer encryption keys in symmetric encryption
D) Combining two encryption keys into a single key

Answer: B) Strengthening weak passwords by increasing computational cost

Explanation: Key stretching techniques (e.g., PBKDF2, bcrypt, Argon2) increase computational effort, making brute-force attacks on passwords more difficult.


Question 196

Which hashing algorithm is considered secure and recommended for digital signatures and integrity verification?

A) SHA-1
B) SHA-256
C) MD5
D) DES

Answer: B) SHA-256

Explanation: SHA-256 is widely used for secure hashing and digital signatures, while SHA-1 and MD5 are considered insecure due to collision vulnerabilities.


Question 197

Which encryption algorithm is used in TLS 1.3 for secure web communications?

A) AES-GCM
B) DES
C) RSA-1024
D) MD5

Answer: A) AES-GCM

Explanation: TLS 1.3 exclusively supports AES-GCM and ChaCha20-Poly1305, removing older, weaker ciphers for stronger encryption security.


Question 198

Which attack exploits the reuse of encryption keys across different sessions?

A) Key recovery attack
B) Brute-force attack
C) Man-in-the-middle attack
D) Replay attack

Answer: A) Key recovery attack

Explanation: Key recovery attacks exploit scenarios where the same encryption key is reused, allowing attackers to analyze ciphertext and infer the key.


Question 199

What is the primary security risk of using static RSA keys for TLS key exchange?

A) Increased encryption speed
B) Vulnerability to quantum computing attacks
C) Lack of perfect forward secrecy (PFS)
D) Incompatibility with AES

Answer: C) Lack of perfect forward secrecy (PFS)

Explanation: Static RSA key exchange does not provide Perfect Forward Secrecy (PFS), meaning past sessions can be decrypted if the private key is compromised.


Question 200

Which of the following is a best practice for securing JWT (JSON Web Tokens)?

A) Using long expiration times for JWTs
B) Storing JWTs in local storage
C) Signing JWTs with asymmetric encryption (RS256 or ES256)
D) Allowing JWTs to be used without signature verification

Answer: C) Signing JWTs with asymmetric encryption (RS256 or ES256)

Explanation: Using asymmetric encryption (e.g., RS256, ES256) for JWTs ensures stronger security and allows signature verification without sharing a private key.


Question 201

Which of the following encryption algorithms is used in WPA3 for securing Wi-Fi networks?

A) AES-GCM
B) RSA
C) MD5
D) DES

Answer: A) AES-GCM

Explanation: WPA3 uses AES-GCM for secure Wi-Fi encryption, replacing WPA2’s AES-CCMP with an improved security model.


Question 202

Which of the following cryptographic attacks exploits poor entropy sources used in key generation?

A) Dictionary attack
B) Predictable key attack
C) Meet-in-the-middle attack
D) Chosen plaintext attack

Answer: B) Predictable key attack

Explanation: Poor entropy in key generation makes encryption keys predictable, allowing attackers to reconstruct encryption keys and break security mechanisms.


Question 203

Which cryptographic standard is used for digital certificates and PKI (Public Key Infrastructure)?

A) SHA-256
B) X.509
C) AES-256
D) RSA-1024

Answer: B) X.509

Explanation: X.509 certificates are used in PKI for authentication, digital signatures, and secure SSL/TLS certificate management.


Question 204

Which cryptographic algorithm is used in Ethereum and other blockchain networks for signing transactions?

A) RSA
B) ECDSA (Elliptic Curve Digital Signature Algorithm)
C) AES-GCM
D) MD5

Answer: B) ECDSA (Elliptic Curve Digital Signature Algorithm)

Explanation: Ethereum and other blockchain networks use ECDSA for digital signatures, ensuring transaction authenticity and preventing unauthorized modifications.


Question 205

Which type of encryption attack attempts to recover the original plaintext by observing multiple encryptions of the same message?

A) Chosen plaintext attack
B) Frequency analysis attack
C) Ciphertext-only attack
D) Replay attack

Answer: C) Ciphertext-only attack

Explanation: Ciphertext-only attacks analyze multiple encrypted messages to detect patterns and infer the original plaintext without access to the key.