Cryptography in Security set 1

Que._________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.
a. Malware Analysis
b. Exploit writing
c. Reverse engineering
d. Cryptography
Que.______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.
a. Malware Analysis
b. Cryptography
c. Reverse engineering
d. Exploit writing
Que.When plain text is converted to unreadable format, it is termed as _____________
a. rotten text
b. raw text
c. cipher-text
d. ciphen-text
Que.Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.
a. secret key
b. external programs
c. add-ons
d. secondary key
Que.Cryptography can be divided into ______ types.
a. 5
b. 4
c. 3
d. 2
Que.Data which is easily readable & understandable without any special algorithm or method is called _________________
a. cipher-text
b. plain text
c. raw text
d. encrypted text
Que.Plain text are also called _____________
a. cipher-text
b. raw text
c. clear-text
d. encrypted text
Que.There are ________ types of cryptographic techniques used in general.
a. 2
b. 3
c. 4
d. 5
Que.Conventional cryptography is also known as _____________ or symmetric-key encryption.
a. secret-key
b. public key
c. protected key
d. primary key
Que.Data Encryption Standard is an example of a _____________ cryptosystem.
a. conventional
b. public key
c. hash key
d. asymmetric-key