MCQs Practice Portal - bitcoinscryptonews.com

Electrical measurements MCQ Quiz Hub

Digital Communications MCQs set-14

Choose a topic to test your knowledge and improve your Electrical measurements skills

In digital communication, interaction between ______ is possible.





✅ Correct Answer: 2

Some advantages of spread spectrum are





✅ Correct Answer: 4

Processing gain is the ratio of message bandwidth to signal bandwidth.





✅ Correct Answer: 2

Which is better for avoiding jamming?





✅ Correct Answer: 2

Which is more bandwidth efficient?





✅ Correct Answer: 3

Which is more simpler to implement?





✅ Correct Answer: 1

Which uses orthogonal codes?





✅ Correct Answer: 1

Which is more suitable when large number of transmitters are used?





✅ Correct Answer: 2

CDMA rejects





✅ Correct Answer: 1

Frequency planning is very essential in





✅ Correct Answer: 3

CDMA uses





✅ Correct Answer: 2

In public key cryptosystem _____ keys are used for encryption and decryption.





✅ Correct Answer: 2

In public key cryptosystem which is kept as public?





✅ Correct Answer: 1

In a trapdoor function, the functions are easy to go in





✅ Correct Answer: 1

Pretty good privacy program is used for





✅ Correct Answer: 3

PGP system uses





✅ Correct Answer: 3

Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption.





✅ Correct Answer: 1

Which are called the block ciphers?





✅ Correct Answer: 4

Which has a key length of 128 bits?





✅ Correct Answer: 1

Which algorithm can be used to sign a message?





✅ Correct Answer: 1

Examples of hash functions are





✅ Correct Answer: 3

A cryptographic hash function has variable output length.





✅ Correct Answer: 2

A set of numbers is called as super increasing if





✅ Correct Answer: 2

Knapsack problem can be solved by





✅ Correct Answer: 1

Merkle hellman is a symmetric cryptosystem.





✅ Correct Answer: 2

In this Merkle Hellman method same key is used for encryption and decryption.





✅ Correct Answer: 2

Cipher system can be solved effectively by statistically using





✅ Correct Answer: 2

Encryption transformations are known as





✅ Correct Answer: 3

For n input bits the number of substitution patterns are





✅ Correct Answer: 2

In transposition, the plaintext letters are





✅ Correct Answer: 2

The substitution of the letters are done





✅ Correct Answer: 2

In cipher feedback method, encryption is done on





✅ Correct Answer: 1

In stream encryption, the key sequence repeats itself.





✅ Correct Answer: 2

In which method, key-stream is generated independently?





✅ Correct Answer: 1

Synchronous ciphers uses





✅ Correct Answer: 1

Public key cryptosystem uses same key for both encryption and decryption.





✅ Correct Answer: 2

Which should be kept as a secret in public key cryptosystem?





✅ Correct Answer: 2

Public key cryptosystem is also known as





✅ Correct Answer: 1

Euler’s totient function is determined by





✅ Correct Answer: 2

Pretty good privacy (PGP) security system uses





✅ Correct Answer: 3

Public key cryptosystem is used for the encryption of





✅ Correct Answer: 2

For digital signatures private key cryptosystem is used.





✅ Correct Answer: 2

Data compression includes





✅ Correct Answer: 3

PGP offers _____ block ciphers for message encryption.





✅ Correct Answer: 4

Which block cipher has key length of 128 bits?





✅ Correct Answer: 3

These three ciphers can operate of ______ of plaintext and cipher text.





✅ Correct Answer: 2

The key size of DES is





✅ Correct Answer: 1

Which operation is used in encryption using IDEA?





✅ Correct Answer: 3

What is the key size allowed in PGP?





✅ Correct Answer: 3

Which algorithm is used for public key encryption?





✅ Correct Answer: 3