

MCQOPTIONS
Saved Bookmarks
This section includes 839 Mcqs, each offering curated multiple-choice questions to sharpen your C++ Programming knowledge and support exam preparation. Choose a topic below to get started.
251. |
To set an environment variable in a streaming command use ____________ |
A. | -cmden EXAMPLE_DIR=/home/example/dictionaries/ |
B. | -cmdev EXAMPLE_DIR=/home/example/dictionaries/ |
C. | -cmdenv EXAMPLE_DIR=/home/example/dictionaries/ |
D. | -cmenv EXAMPLE_DIR=/home/example/dictionaries/ |
Answer» D. -cmenv EXAMPLE_DIR=/home/example/dictionaries/ | |
252. |
Which of the following class provides a subset of features provided by the Unix/GNU Sort? |
A. | KeyFieldBased |
B. | KeyFieldComparator |
C. | KeyFieldBasedComparator |
D. | All of the mentioned |
Answer» D. All of the mentioned | |
253. |
Hadoop data is not sequenced and is in 64MB to 256MB block sizes of delimited record values with schema applied on read based on ____________ |
A. | HCatalog |
B. | Hive |
C. | Hbase |
D. | All of the mentioned |
Answer» B. Hive | |
254. |
In AES, to make the s-box, we apply the transformation –b’i = bi XOR b(i+4) XOR b(i+5) XOR b(i+6) XOR b(i+7) XOR ciWhat is ci in this transformation? |
A. | ci is the ith bit of byte c with value 0x63 |
B. | ci is the ith bit of byte c with value 0x25 |
C. | ci is the ith bit of byte c with value 0x8F |
D. | ci is the ith bit of byte c with value 0x8A |
Answer» B. ci is the ith bit of byte c with value 0x25 | |
255. |
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is |
A. | Short |
B. | Long |
C. | Flat |
D. | Thin |
Answer» C. Flat | |
256. |
Using Differential Crypt-analysis, the minimum computations required to decipher the DES algorithm is- |
A. | 2^56 |
B. | 2^43 |
C. | 2^55 |
D. | 2^47 |
Answer» E. | |
257. |
In Cryptography, when text is treated at the bit level, each character is replaced by |
A. | 4 Bits |
B. | 6 Bits |
C. | 8 Bits |
D. | 10 B its |
Answer» D. 10 B its | |
258. |
The relationship between a character in the plaintext to a character is |
A. | many-to-one relationship |
B. | one-to-many relationship |
C. | many-to-many relationship |
D. | None |
Answer» C. many-to-many relationship | |
259. |
Maurer’s Universal Statistical Test is |
A. | a test to determine whether the number of runs of ones and zeros of various lengths is as expecte |
B. | a test to detect if a sequence can be significantly compressed without loss of information |
C. | a test to determine whether the number of ones and zeros in a sequence is approx the same as in a truely random o/p |
D. | a test for the check of evenness in the 1s and 0s |
Answer» C. a test to determine whether the number of ones and zeros in a sequence is approx the same as in a truely random o/p | |
260. |
The shift cipher is sometimes referred to as the |
A. | Caesar cipher |
B. | Shift cipher |
C. | cipher |
D. | cipher text |
Answer» B. Shift cipher | |
261. |
The heart of Data Encryption Standard (DES), is the |
A. | Cipher |
B. | Rounds |
C. | Encryption |
D. | DES function |
Answer» E. | |
262. |
The blowfish algorithm’s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___ bytes. |
A. | 4096 |
B. | 4608 |
C. | 4168 |
D. | 4864 |
Answer» D. 4864 | |
263. |
Division of (131B6C3) base 16 by (lA2F) base 16 yeilds |
A. | 1AD |
B. | DAD |
C. | BAD |
D. | 9AD |
Answer» E. | |
264. |
The ciphers of today are called |
A. | Substitution Cipher |
B. | Round ciphers |
C. | Transposition Cipher |
D. | None |
Answer» C. Transposition Cipher | |
265. |
A substitution cipher substitutes one symbol with |
A. | Keys |
B. | Others |
C. | Multi Parties |
D. | Single Party |
Answer» C. Multi Parties | |
266. |
In symmetric-key cryptography, the same key is used by |
A. | One Party |
B. | Multi Party |
C. | Third Party |
D. | Both Party |
Answer» E. | |
267. |
In Cryptography, the original message, before being transformed, is called |
A. | Simple Text |
B. | Plain Text |
C. | Empty Text |
D. | Filled Text |
Answer» C. Empty Text | |
268. |
The plain text for the cipher text RRLMWBKASPDH. Given the encryption key[(17 17 5 | 21 18 21 | 2 2 19)] is – |
A. | PAYMOREMONEY |
B. | PAYINGRANSOM |
C. | GETINTHECAB |
D. | THEEXPRESSID |
Answer» B. PAYINGRANSOM | |
269. |
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to |
A. | Others |
B. | Data |
C. | Keys |
D. | Each other |
Answer» E. | |
270. |
Data Encryption Standard (DES), was designed by |
A. | Intel |
B. | IBM |
C. | HP |
D. | Sony |
Answer» C. HP | |
271. |
The inverse s-box permutation follows - b’i = b(i+2) XOR b(i+5) XOR b(i+7) XOR diHere di is – |
A. | di is the ith bit of a byte ‘d’ whose hex value is 0x15 |
B. | di is the ith bit of a byte ‘d’ whose hex value is 0x05 |
C. | di is the ith bit of a byte ‘d’ whose hex value is 0x25 |
D. | di is the ith bit of a byte ‘d’ whose hex value is 0x51 |
Answer» C. di is the ith bit of a byte ‘d’ whose hex value is 0x25 | |
272. |
Which of the following statements are true with respect to the blowfish algorithm?i) Provided key is large enough, brute-force key search is not practical, especially given the high key schedule costii) Key dependent S-boxes and sub keys make analysis very difficultiii) Changing both halves in each round increases securityiv) Blowfish has improved avalanche effects |
A. | i) ii) and iv) |
B. | ii) and iii) |
C. | i) |
D. | All are true |
Answer» E. | |
273. |
We use Cryptography term to transforming messages to make them secure and immune to |
A. | Change |
B. | Idle |
C. | Attacks |
D. | Defend |
Answer» D. Defend | |
274. |
For RSA to work, the value of P must be less than the value of |
A. | p |
B. | q |
C. | n |
D. | r |
Answer» D. r | |
275. |
The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not |
A. | Authenticated |
B. | Joined |
C. | Submit |
D. | Separate |
Answer» B. Joined | |
276. |
On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword “HUMOR” we get cipher text |
A. | abqdnwewuwjphfvrrtrfznsdokvl |
B. | abqdvmwuwjphfvvyyrfznydokvl |
C. | tbqyrvmwuwjphfvvyyrfznydokvl |
D. | baiuvmwuwjphfoeiyrfznydokvl |
Answer» C. tbqyrvmwuwjphfvvyyrfznydokvl | |
277. |
The substitutional cipers are |
A. | Monoalphabatic |
B. | Sami alphabetic |
C. | polyalphabetic |
D. | both a and c |
Answer» E. | |
278. |
In Rotation Cipher, keyless rotation the number of rotations is |
A. | Jammed |
B. | Idle |
C. | Rotating |
D. | Fixed |
Answer» E. | |
279. |
In Cryptography, the input bits are rotated to right or left in |
A. | Rotation Cipher |
B. | XOR cipher |
C. | cipher |
D. | cipher text |
Answer» B. XOR cipher | |
280. |
The original message, before being transformed, is |
A. | Cipher text |
B. | plaintext |
C. | decryption |
D. | None |
Answer» C. decryption | |
281. |
In symmetric-key cryptography, the key locks and unlocks the box is |
A. | same |
B. | shared |
C. | private |
D. | public |
Answer» B. shared | |
282. |
The last two blocks of the XTS-AES mode are |
A. | padded as 10* |
B. | encrypted/ decrypted using ciphertext-stealing |
C. | padded as 10*1 |
D. | padded and then swapped after encryption/ decryption |
Answer» C. padded as 10*1 | |
283. |
An encryption algorithm transforms the plaintext into |
A. | Cipher text |
B. | Simple Text |
C. | Plain Text |
D. | Empty Text |
Answer» B. Simple Text | |
284. |
The ciphers of today are called round ciphers because they involve |
A. | Single Round |
B. | Double Rounds |
C. | Multiple Round |
D. | Round about |
Answer» D. Round about | |
285. |
The International Data Encryption Algorithm (IDEA) was developed by |
A. | Xuejia Lai and James Massey |
B. | Xuejia Lai and Bruce Schneier |
C. | Xuejia Lai and Carlisle Adams |
D. | Xuejia Lai and Stafford Tavares |
Answer» B. Xuejia Lai and Bruce Schneier | |
286. |
The cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of |
A. | Frames |
B. | Pixels |
C. | Data |
D. | Encryption |
Answer» D. Encryption | |
287. |
The cryptography algorithms (ciphers) are divided into |
A. | two groups |
B. | four groups |
C. | one single group |
D. | None |
Answer» B. four groups | |
288. |
An asymmetric-key (or public-key) cipher uses |
A. | 1 Key |
B. | 2 Key |
C. | 3 Key |
D. | 4 Key |
Answer» C. 3 Key | |
289. |
DES stands for |
A. | Data Encryption Standard |
B. | Data Encryption Subscription |
C. | Data Encryption Solutions |
D. | Data Encryption Slots |
Answer» B. Data Encryption Subscription | |
290. |
Symmetric-key cryptography started thousands of years ago when people needed to exchange |
A. | Files |
B. | Packets |
C. | Secrets |
D. | Transmission |
Answer» D. Transmission | |
291. |
A straight permutation cipher or a straight P-box has the same number of inputs as |
A. | cipher |
B. | Frames |
C. | Outputs |
D. | Bits |
Answer» D. Bits | |
292. |
Cryptography, a word with Greek origins, means |
A. | Corrupting Data |
B. | Secret Writing |
C. | Open Writing |
D. | Closed Writing |
Answer» C. Open Writing | |
293. |
Consider the cipher text message:YJIHX RVHKK KSKHK IQQEV IFLRK QUZVA EVFYZ RVFBX UKGBP KYVVB QTAJK TGBQO ISGHU CWIKX QUXIH DUGIU LMWKG CHXJV WEKIH HEHGR EXXSF DMIIL UPSLW UPSLW AJKTR WTOWP IVXBW NPTGW EKBYU SBQWSRelative Frequencies3 7 2 2 5 5 7 9 11 4 14 4 2 1 3 4 6 5 6 5 7 10 9 8 4 2The Index of Coincidence is |
A. | 0.065 |
B. | 0.048 |
C. | 0.067 |
D. | 0.044 |
Answer» E. | |
294. |
A transposition cipher reorders (permutes) symbols in a |
A. | block of packets |
B. | block of slots |
C. | block of signals |
D. | block of symbols |
Answer» E. | |
295. |
The Advanced Encryption Standard (AES) was designed |
A. | National Institute of Standards and Technology |
B. | IBM |
C. | HP |
D. | Intel |
Answer» B. IBM | |
296. |
In symmetric key cryptography, the key used by the sender and the receiver is |
A. | shared |
B. | different |
C. | two keys are used |
D. | None |
Answer» B. different | |
297. |
The keys used in cryptography are |
A. | secret key |
B. | private key |
C. | public key |
D. | All of them |
Answer» E. | |
298. |
Using SDES, the Plaintext for the Ciphertext 00001111, given that the key is 1111111111 is, |
A. | 01100111 |
B. | 00001010 |
C. | 11111111 |
D. | 01101101 |
Answer» D. 01101101 | |
299. |
A substitution cipher replaces one symbol with |
A. | same symbol |
B. | provide two symbols for each |
C. | another |
D. | All of them |
Answer» D. All of them | |
300. |
In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ______________ |
A. | Scaling of the existing bits |
B. | Duplication of the existing bits |
C. | Addition of zeros |
D. | Addition of ones |
Answer» B. Duplication of the existing bits | |