ASSURANCE|CRYPTOGRAPHY AND DATA SECURITY
DIVISION|CRYPTOGRAPHY – QUIZZES EXAMINATION
(Encryption, Decryption & Secure Communication Assessment)
CRYP-QZ-2026- Cryptography & Network Security
ACADAMIC YEAR:2026
Which of the following refers to the study of breaking cryptographic systems?
a) Cryptology.
b) Cryptography.
c) Cryptanalyisis.
d) Cryptosystems.
Cryptanalyisis.
Which of the following branches of cryptography applies cryptographic algorithms to establish
secure communications?
a) Symmetric algorithms.
b) Asymmetric algorithms.
1|Page
,c) Cryptographic protocols.
d) None of the above.
Cryptographic protocols
Which of the following branches of cryptography involves encryption and decryption using a
single secret key?
a) Symmetric algorithms.
b) Asymmetric algorithms.
c) Cryptographic protocols.
d) None of the above.
Symmetric algorithms
Which of the following is NOT a requirement of good symmetric cryptography?
a) A secure channel to get the key to both participants of a communication.
b) A large enough keyspace to prevent attackers from easily guessing the key.
c) An algorithm that is only known to the participants of the communication.
2|Page
,d) Publicly known and thoroughly tested encryption and decryption algorithms
An algorithm that is only known to the participants of the communication.
What is the best technique for breaking a substitution cipher?
a) A brute force attack.
b) A statistical approach using frequency analysis.
c) An implementation attack.
d) A social engineering attack.
A statistical approach using frequency analysis.
Which type of attack involves tricking or coercing human beings with access to secret keys to
reveal them?
a) A brute-force attack.
b) An analytical attack.
c) An implementation attack.
3|Page
, d) A social engineering attack.
A social engineering attack.
What is the best defense against a brute-force attack on a cipher?
a) Using an asymmetric algorithm instead of a symmetric algorithm.
b) Using a proprietary encryption algorithm.
c) Using a key length of 256 bits for a symmetric cipher, or the equivalent for an asymmetric
cipher.
d) Encrypting the message twice with the same key.
Using a key length of 256 bits for a symmetric cipher, or the equivalent for an asymmetric
cipher.
Which of the following is not true about modular arithmetic given integers a and m > 0?
a) There are multiple values for r between 0 and m - 1 such that
a ≡ r mod m
b) In general, there are infinitely many possible values of r that satisfy
a ≡ r mod m
c) The set of all values of r that satisfy
4|Page