1. _________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
a. Malware Analysis
b. Exploit writing
c. Reverse engineering
d. Cryptography
Answer: (d).Cryptography

2. ______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
a. Malware Analysis
b. Cryptography
c. Reverse engineering
d. Exploit writing
Answer: (b).Cryptography

3. When plain text is converted to unreadable format, it is termed as _____________
a. rotten text
b. raw text
c. cipher-text
d. ciphen-text
Answer: (c).cipher-text

4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
a. secret key
b. external programs
c. add-ons
d. secondary key
Answer: (a).secret key

5. Cryptography can be divided into ______ types.
a. 5
b. 4
c. 3
d. 2
Answer: (d).2

6. Data which is easily readable & understandable without any special algorithm or method is called _________________
a. cipher-text
b. plain text
c. raw text
d. encrypted text
Answer: (b).plain text

7. Plain text are also called _____________
a. cipher-text
b. raw text
c. clear-text
d. encrypted text
Answer: (c).clear-text

8. There are ________ types of cryptographic techniques used in general.
a. 2
b. 3
c. 4
d. 5
Answer: (b).3

9. Conventional cryptography is also known as _____________ or symmetric-key encryption.
a. secret-key
b. public key
c. protected key
d. primary key
Answer: (a).secret-key

10. Data Encryption Standard is an example of a _____________ cryptosystem.
a. conventional
b. public key
c. hash key
d. asymmetric-key
Answer: (a).conventional

Page 1 of 6