Explore topic-wise MCQs in C++ Programming.

This section includes 839 Mcqs, each offering curated multiple-choice questions to sharpen your C++ Programming knowledge and support exam preparation. Choose a topic below to get started.

251.

To set an environment variable in a streaming command use ____________

A. -cmden EXAMPLE_DIR=/home/example/dictionaries/
B. -cmdev EXAMPLE_DIR=/home/example/dictionaries/
C. -cmdenv EXAMPLE_DIR=/home/example/dictionaries/
D. -cmenv EXAMPLE_DIR=/home/example/dictionaries/
Answer» D. -cmenv EXAMPLE_DIR=/home/example/dictionaries/
252.

Which of the following class provides a subset of features provided by the Unix/GNU Sort?

A. KeyFieldBased
B. KeyFieldComparator
C. KeyFieldBasedComparator
D. All of the mentioned
Answer» D. All of the mentioned
253.

Hadoop data is not sequenced and is in 64MB to 256MB block sizes of delimited record values with schema applied on read based on ____________

A. HCatalog
B. Hive
C. Hbase
D. All of the mentioned
Answer» B. Hive
254.

In AES, to make the s-box, we apply the transformation –b’i = bi XOR b(i+4) XOR b(i+5) XOR b(i+6) XOR b(i+7) XOR ciWhat is ci in this transformation?

A. ci is the ith bit of byte c with value 0x63
B. ci is the ith bit of byte c with value 0x25
C. ci is the ith bit of byte c with value 0x8F
D. ci is the ith bit of byte c with value 0x8A
Answer» B. ci is the ith bit of byte c with value 0x25
255.

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

A. Short
B. Long
C. Flat
D. Thin
Answer» C. Flat
256.

Using Differential Crypt-analysis, the minimum computations required to decipher the DES algorithm is-

A. 2^56
B. 2^43
C. 2^55
D. 2^47
Answer» E.
257.

In Cryptography, when text is treated at the bit level, each character is replaced by

A. 4 Bits
B. 6 Bits
C. 8 Bits
D. 10 B its
Answer» D. 10 B its
258.

The relationship between a character in the plaintext to a character is

A. many-to-one relationship
B. one-to-many relationship
C. many-to-many relationship
D. None
Answer» C. many-to-many relationship
259.

Maurer’s Universal Statistical Test is

A. a test to determine whether the number of runs of ones and zeros of various lengths is as expecte
B. a test to detect if a sequence can be significantly compressed without loss of information
C. a test to determine whether the number of ones and zeros in a sequence is approx the same as in a truely random o/p
D. a test for the check of evenness in the 1s and 0s
Answer» C. a test to determine whether the number of ones and zeros in a sequence is approx the same as in a truely random o/p
260.

The shift cipher is sometimes referred to as the

A. Caesar cipher
B. Shift cipher
C. cipher
D. cipher text
Answer» B. Shift cipher
261.

The heart of Data Encryption Standard (DES), is the

A. Cipher
B. Rounds
C. Encryption
D. DES function
Answer» E.
262.

The blowfish algorithm’s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___ bytes.

A. 4096
B. 4608
C. 4168
D. 4864
Answer» D. 4864
263.

Division of (131B6C3) base 16 by (lA2F) base 16 yeilds

A. 1AD
B. DAD
C. BAD
D. 9AD
Answer» E.
264.

The ciphers of today are called

A. Substitution Cipher
B. Round ciphers
C. Transposition Cipher
D. None
Answer» C. Transposition Cipher
265.

A substitution cipher substitutes one symbol with

A. Keys
B. Others
C. Multi Parties
D. Single Party
Answer» C. Multi Parties
266.

In symmetric-key cryptography, the same key is used by

A. One Party
B. Multi Party
C. Third Party
D. Both Party
Answer» E.
267.

In Cryptography, the original message, before being transformed, is called

A. Simple Text
B. Plain Text
C. Empty Text
D. Filled Text
Answer» C. Empty Text
268.

The plain text for the cipher text RRLMWBKASPDH. Given the encryption key[(17 17 5 | 21 18 21 | 2 2 19)] is –

A. PAYMOREMONEY
B. PAYINGRANSOM
C. GETINTHECAB
D. THEEXPRESSID
Answer» B. PAYINGRANSOM
269.

In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

A. Others
B. Data
C. Keys
D. Each other
Answer» E.
270.

Data Encryption Standard (DES), was designed by

A. Intel
B. IBM
C. HP
D. Sony
Answer» C. HP
271.

The inverse s-box permutation follows - b’i = b(i+2) XOR b(i+5) XOR b(i+7) XOR diHere di is –

A. di is the ith bit of a byte ‘d’ whose hex value is 0x15
B. di is the ith bit of a byte ‘d’ whose hex value is 0x05
C. di is the ith bit of a byte ‘d’ whose hex value is 0x25
D. di is the ith bit of a byte ‘d’ whose hex value is 0x51
Answer» C. di is the ith bit of a byte ‘d’ whose hex value is 0x25
272.

Which of the following statements are true with respect to the blowfish algorithm?i) Provided key is large enough, brute-force key search is not practical, especially given the high key schedule costii) Key dependent S-boxes and sub keys make analysis very difficultiii) Changing both halves in each round increases securityiv) Blowfish has improved avalanche effects

A. i) ii) and iv)
B. ii) and iii)
C. i)
D. All are true
Answer» E.
273.

We use Cryptography term to transforming messages to make them secure and immune to

A. Change
B. Idle
C. Attacks
D. Defend
Answer» D. Defend
274.

For RSA to work, the value of P must be less than the value of

A. p
B. q
C. n
D. r
Answer» D. r
275.

The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not

A. Authenticated
B. Joined
C. Submit
D. Separate
Answer» B. Joined
276.

On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword “HUMOR” we get cipher text

A. abqdnwewuwjphfvrrtrfznsdokvl
B. abqdvmwuwjphfvvyyrfznydokvl
C. tbqyrvmwuwjphfvvyyrfznydokvl
D. baiuvmwuwjphfoeiyrfznydokvl
Answer» C. tbqyrvmwuwjphfvvyyrfznydokvl
277.

The substitutional cipers are

A. Monoalphabatic
B. Sami alphabetic
C. polyalphabetic
D. both a and c
Answer» E.
278.

In Rotation Cipher, keyless rotation the number of rotations is

A. Jammed
B. Idle
C. Rotating
D. Fixed
Answer» E.
279.

In Cryptography, the input bits are rotated to right or left in

A. Rotation Cipher
B. XOR cipher
C. cipher
D. cipher text
Answer» B. XOR cipher
280.

The original message, before being transformed, is

A. Cipher text
B. plaintext
C. decryption
D. None
Answer» C. decryption
281.

In symmetric-key cryptography, the key locks and unlocks the box is

A. same
B. shared
C. private
D. public
Answer» B. shared
282.

The last two blocks of the XTS-AES mode are

A. padded as 10*
B. encrypted/ decrypted using ciphertext-stealing
C. padded as 10*1
D. padded and then swapped after encryption/ decryption
Answer» C. padded as 10*1
283.

An encryption algorithm transforms the plaintext into

A. Cipher text
B. Simple Text
C. Plain Text
D. Empty Text
Answer» B. Simple Text
284.

The ciphers of today are called round ciphers because they involve

A. Single Round
B. Double Rounds
C. Multiple Round
D. Round about
Answer» D. Round about
285.

The International Data Encryption Algorithm (IDEA) was developed by

A. Xuejia Lai and James Massey
B. Xuejia Lai and Bruce Schneier
C. Xuejia Lai and Carlisle Adams
D. Xuejia Lai and Stafford Tavares
Answer» B. Xuejia Lai and Bruce Schneier
286.

The cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of

A. Frames
B. Pixels
C. Data
D. Encryption
Answer» D. Encryption
287.

The cryptography algorithms (ciphers) are divided into

A. two groups
B. four groups
C. one single group
D. None
Answer» B. four groups
288.

An asymmetric-key (or public-key) cipher uses

A. 1 Key
B. 2 Key
C. 3 Key
D. 4 Key
Answer» C. 3 Key
289.

DES stands for

A. Data Encryption Standard
B. Data Encryption Subscription
C. Data Encryption Solutions
D. Data Encryption Slots
Answer» B. Data Encryption Subscription
290.

Symmetric-key cryptography started thousands of years ago when people needed to exchange

A. Files
B. Packets
C. Secrets
D. Transmission
Answer» D. Transmission
291.

A straight permutation cipher or a straight P-box has the same number of inputs as

A. cipher
B. Frames
C. Outputs
D. Bits
Answer» D. Bits
292.

Cryptography, a word with Greek origins, means

A. Corrupting Data
B. Secret Writing
C. Open Writing
D. Closed Writing
Answer» C. Open Writing
293.

Consider the cipher text message:YJIHX RVHKK KSKHK IQQEV IFLRK QUZVA EVFYZ RVFBX UKGBP KYVVB QTAJK TGBQO ISGHU CWIKX QUXIH DUGIU LMWKG CHXJV WEKIH HEHGR EXXSF DMIIL UPSLW UPSLW AJKTR WTOWP IVXBW NPTGW EKBYU SBQWSRelative Frequencies3 7 2 2 5 5 7 9 11 4 14 4 2 1 3 4 6 5 6 5 7 10 9 8 4 2The Index of Coincidence is

A. 0.065
B. 0.048
C. 0.067
D. 0.044
Answer» E.
294.

A transposition cipher reorders (permutes) symbols in a

A. block of packets
B. block of slots
C. block of signals
D. block of symbols
Answer» E.
295.

The Advanced Encryption Standard (AES) was designed

A. National Institute of Standards and Technology
B. IBM
C. HP
D. Intel
Answer» B. IBM
296.

In symmetric key cryptography, the key used by the sender and the receiver is

A. shared
B. different
C. two keys are used
D. None
Answer» B. different
297.

The keys used in cryptography are

A. secret key
B. private key
C. public key
D. All of them
Answer» E.
298.

Using SDES, the Plaintext for the Ciphertext 00001111, given that the key is 1111111111 is,

A. 01100111
B. 00001010
C. 11111111
D. 01101101
Answer» D. 01101101
299.

A substitution cipher replaces one symbol with

A. same symbol
B. provide two symbols for each
C. another
D. All of them
Answer» D. All of them
300.

In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ______________

A. Scaling of the existing bits
B. Duplication of the existing bits
C. Addition of zeros
D. Addition of ones
Answer» B. Duplication of the existing bits