Electrical measurements/Digital Communications MCQs set-14 Sample Test,Sample questions

Question:
A cryptographic hash function has variable output length.

1.True

2.False

Posted Date:-2022-05-24 15:50:54


Question:
A set of numbers is called as super increasing if

1.Each element is greater than previous element

2.Each element greater than sum of all the previous elements

3.Each element greater than the average of all elements

4.Each element lesser than the sum of all the elements

Posted Date:-2022-05-24 15:51:34


Question:
CDMA rejects

1.Narrow band interference

2.Wide band interference

3.Narrow & Wide band interference

4. None of the mentioned

Posted Date:-2022-05-24 14:43:12


Question:
CDMA uses

1.Hard hand off

2.Soft hand off

3.Hard & Soft hand off

4.None of the mentioned

Posted Date:-2022-05-24 14:44:18


Question:
Cipher system can be solved effectively by statistically using

1.Time of occurrence

2.Frequency of occurrence

3.Length of the message

4.None of the mentioned

Posted Date:-2022-05-25 08:17:56


Question:
Data compression includes

1.Removal of redundant character

2.Uniform distribution of characters

3.Removal of redundant character & Uniform distribution of characters

4.None of the mentioned

Posted Date:-2022-05-25 08:34:09


Question:
Encryption transformations are known as

1.Diffusion

2.Confusion

3.Diffusion & Confusion

4.None of the mentioned

Posted Date:-2022-05-25 08:19:27


Question:
Euler’s totient function is determined by

1.pq

2.(p-1)(q-1)

3.(p+1)(q+1)

4.p/q

Posted Date:-2022-05-25 08:31:54


Question:
Examples of hash functions are

1.MD5

2.SHA-1

3.MD5 & SHA-1

4. None of the mentioned

Posted Date:-2022-05-24 15:50:27


Question:
For digital signatures private key cryptosystem is used.

1.True

2.False

Posted Date:-2022-05-25 08:33:30


Question:
For n input bits the number of substitution patterns are

1.2n

2.(2n)!

3.1/2n!

4. 2n!

Posted Date:-2022-05-25 08:20:05


Question:
Frequency planning is very essential in

1.FDMA

2.TDMA

3.FDMA & TDMA

4.None of the mentioned

Posted Date:-2022-05-24 14:43:45


Question:
In a trapdoor function, the functions are easy to go in

1.One direction

2.Two directions

3.All directions

4.None of the mentioned

Posted Date:-2022-05-24 14:46:16


Question:
In cipher feedback method, encryption is done on

1.Single individual bits

2. Characters

3.Single individual bits & Characters

4.None of the mentioned

Posted Date:-2022-05-25 08:21:45


Question:
In digital communication, interaction between ______ is possible.

1.Any layer to layer

2.One layer to next layer

3. layers

4.None of the mentioned

Posted Date:-2022-05-24 14:37:21


Question:
In public key cryptosystem which is kept as public?

1.Encryption keys

2.Decryption keys

3.Encryption & Decryption keys

4.None of the mentioned

Posted Date:-2022-05-24 14:45:45


Question:
In public key cryptosystem _____ keys are used for encryption and decryption.

1.Same

2.Different

3.Encryption Keys

4.None of the mentioned

Posted Date:-2022-05-24 14:45:07


Question:
In stream encryption, the key sequence repeats itself.

1.True

2.False

Posted Date:-2022-05-25 08:29:00


Question:
In this Merkle Hellman method same key is used for encryption and decryption.

1.True

2.False

Posted Date:-2022-05-24 15:52:58


Question:
In transposition, the plaintext letters are

1.Substituted

2.Rearranged

3.Removed

4.None of the mentioned

Posted Date:-2022-05-25 08:20:41


Question:
In which method, key-stream is generated independently?

1.Synchronous

2.Self synchronous

3.Synchronous & Self synchronous

4.None of the mentioned

Posted Date:-2022-05-25 08:29:36


Question:
Knapsack problem can be solved by

1.Public key cryptosystem

2.Private key cryptosystem

3. Public & Private key cryptosystem

4.None of the mentioned

Posted Date:-2022-05-24 15:52:12


Question:
Merkle hellman is a symmetric cryptosystem.

1.True

2.False

Posted Date:-2022-05-24 15:52:35


Question:
PGP offers _____ block ciphers for message encryption.

1.Triple-DES

2.CAST

3.IDEA

4.All of the mentioned

Posted Date:-2022-05-25 08:34:40


Question:
PGP system uses

1.Private key system

2.Public key system

3.Private & Public key system

4.None of the mentioned

Posted Date:-2022-05-24 14:47:28


Question:
Pretty good privacy (PGP) security system uses

1.Public key cryptosystem

2.Private key cryptosystem

3.Public & Private key cryptosystem

4.None of the mentioned

Posted Date:-2022-05-25 08:32:42


Question:
Pretty good privacy program is used for

1.Electronic mails

2.File encryption

3.Electronic mails & File encryption

4.None of the mentioned

Posted Date:-2022-05-24 14:46:55


Question:
Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption.

1.Messages, session key

2.Session key, messages

3.Can be used for both

4.None of the mentioned

Posted Date:-2022-05-24 14:48:05


Question:
Processing gain is the ratio of message bandwidth to signal bandwidth.

1.True

2.False

Posted Date:-2022-05-24 14:39:12


Question:
Public key cryptosystem is also known as

1.One way function

2.Two way function

3.Feedback function

4.None of the mentioned

Posted Date:-2022-05-25 08:31:24


Question:
Public key cryptosystem is used for the encryption of

1.Messages

2. Session key

3. Session key & Messages

4.None of the mentioned

Posted Date:-2022-05-25 08:33:12


Question:
Public key cryptosystem uses same key for both encryption and decryption.

1.True

2.False

Posted Date:-2022-05-25 08:30:22


Question:
Some advantages of spread spectrum are

1.Low susceptibility

2.Immunity to jamming

3.Reduced interference

4.All of the mentioned

Posted Date:-2022-05-24 14:38:46


Question:
Synchronous ciphers uses

1.Confusion

2.Diffusion

3.Confusion & Diffusion

4.None of the mentioned

Posted Date:-2022-05-25 08:30:03


Question:
The key size of DES is

1.56 bits

2.64 bits

3. 128 bits

4.168 bits

Posted Date:-2022-05-25 08:36:11


Question:
The substitution of the letters are done

1.Serially

2.Parallel way

3.Serially & Parallel way

4. None of the mentioned

Posted Date:-2022-05-25 08:21:13


Question:
These three ciphers can operate of ______ of plaintext and cipher text.

1.128 bit blocks

2.64 bit blocks

3.256 bit blocks

4.156 bit blocks

Posted Date:-2022-05-25 08:35:43


Question:
What is the key size allowed in PGP?

1.1024-1056

2.1024-4056

3.1024-4096

4. 1024-2048

Posted Date:-2022-05-25 08:37:11


Question:
Which algorithm can be used to sign a message?

1.Public key algorithm

2.Private key algorithm

3.Public & Private key algorithm

4.None of the mentioned

Posted Date:-2022-05-24 15:49:53


Question:
Which algorithm is used for public key encryption?

1.RSA

2.Diffie-Hellman

3.RSA & Diffie-Hellman

4.None of the mentioned

Posted Date:-2022-05-25 08:37:47


Question:
Which are called the block ciphers?

1.IDEA

2.CAST

3.Triple-DES

4.All of the mentioned

Posted Date:-2022-05-24 15:48:38


Question:
Which block cipher has key length of 128 bits?

1.IDEA

2.CAST

3.IDEA & CAST

4.None of the mentioned

Posted Date:-2022-05-25 08:35:12


Question:
Which has a key length of 128 bits?

1.IDEA

2.Triple-DES

3.IDEA & Triple-DES

4.None of the mentioned

Posted Date:-2022-05-24 15:49:18


Question:
Which is better for avoiding jamming?

1.Direct sequence spread spectrum

2.Frequency hopping spread spectrum

3.Time hopping spread spectrum

4.None of the mentioned

Posted Date:-2022-05-24 14:39:48


Question:
Which is more bandwidth efficient?

1.Direct sequence spread spectrum

2.Frequency hopping spread spectrum

3.Time hopping spread spectrum

4.None of the mentioned

Posted Date:-2022-05-24 14:40:30


Question:
Which is more simpler to implement?

1.Direct sequence spread spectrum

2.Frequency hopping spread spectrum

3.Time hopping spread spectrum

4.None of the mentioned

Posted Date:-2022-05-24 14:41:09


Question:
Which is more suitable when large number of transmitters are used?

1.Synchronous CDMA

2.Asynchronous CDMA

3.Synchronous & Asynchronous CDMA

4.None of the mentioned

Posted Date:-2022-05-24 14:42:37


Question:
Which operation is used in encryption using IDEA?

1.Addition modulo 216

2. Bit wise XOR

3.Addition modulo 216 & Bit wise XOR

4.None of the mentioned

Posted Date:-2022-05-25 08:36:44


Question:
Which should be kept as a secret in public key cryptosystem?

1.Encryption key

2.Decryption key

3.Encryption & Decryption key

4.None of the mentioned

Posted Date:-2022-05-25 08:30:52


Question:
Which uses orthogonal codes?

1.Synchronous CDMA

2.Asynchronous CDMA

3.Synchronous & Asynchronous CDMA

4.None of the mentioned

Posted Date:-2022-05-24 14:42:00


More MCQS

  1. Electrical Measurement MCQ Question Set 1
  2. Electrical Measurement MCQ Question Set 2
  3. Electrical Measurement MCQ Question Set 3
  4. Electrical Measurement MCQ Question Set 4
  5. Electrical Measurement MCQ Question Set 5
  6. Electrical Measurement MCQ Question Set 6
  7. Electrical Measurement MCQ Question Set 7
  8. Electrical Measurement MCQ Question Set 8
  9. Electrical Measurement MCQ Question Set 9
  10. Electrical Measurement MCQ Question Set 10
  11. Electrical Measurement MCQ Question Set 11
  12. Electrical Measurement MCQ Question Set 12
  13. Electrical Measurement MCQ Question Set 13
  14. Electrical Measurement MCQ Question Set 14
  15. Electrical Measurement MCQ Question Set 15
  16. Electrical Measurement MCQ Question Set 16
  17. Electrical Measurement MCQ Question Set 17
  18. Digital Communications MCQs set-1
  19. Digital Communications MCQs set-2
  20. Digital Communications MCQs set-3
  21. Digital Communications MCQs set-4
  22. Digital Communications MCQs set-5
  23. Digital Communications MCQs set-6
  24. Digital Communications MCQs set-7
  25. Digital Communications MCQs set-8
  26. Digital Communications MCQs set-9
  27. Digital Communications MCQs set-10
  28. Digital Communications MCQs set-11
  29. Digital Communications MCQs set-12
  30. Digital Communications MCQs set-13
  31. Digital Communications MCQs set-14
  32. Digital Communications MCQs set-15
  33. Digital Communications MCQs set-16
  34. Digital Communications MCQs set-17
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!