Explore topic-wise MCQs in Uncategorized topics.

This section includes 87 Mcqs, each offering curated multiple-choice questions to sharpen your Uncategorized topics knowledge and support exam preparation. Choose a topic below to get started.

1.

We use cryptofraphy term to transform messages to make them secure and immune to

A. change
B. idle
C. attacks
D. defend
Answer» D. defend
2.

A straight permutation cipher or a straight p-box has the same number of input as

A. cipher
B. frames
C. outputs
D. bits
Answer» D. bits
3.

In cryptography , the original message before being transformmed , is called

A. simple text
B. plain text
C. empty text
D. filled text
Answer» C. empty text
4.

The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not

A. authenticated
B. joined
C. submit
D. separate
Answer» B. joined
5.

Encryption Strength is based on

A. strength of algorithm
B. secrecy of key
C. length of key
D. all of the above
Answer» E.
6.

TCP/IP model does not have layer but OSI model have this layer.

A. session layer
B. transport layer
C. application layer
D. network layer
Answer» B. transport layer
7.

In cryptography, the order of the letters in a message is rearranged by

A. transpositional ciphers
B. substitution ciphers
C. both
D. quadratic ciphers
Answer» B. substitution ciphers
8.

SFTP is abbreviated as

A. secure file transfer protocol
B. secured file transfer protocol
C. secure folder transfer protocol
D. secure file transferring protoco
Answer» B. secured file transfer protocol
9.

mointors user activity on internet and transmit that information in the background to someone else

A. malware
B. spyware
C. adware
D. none of these
Answer» C. adware
10.

The full form of Malware is

A. malfunctioned software
B. multipurpose software
C. malicious software
D. malfunctioning of security
Answer» D. malfunctioning of security
11.

Firewall is type of------

A. virus
B. security threat
C. worm
D. none of these
Answer» E.
12.

Which of them is not an ideal way of spreading the virus?

A. infected website
B. e-mails
C. official antivirus cds
D. usbs
Answer» D. usbs
13.

There are types of computer virus.

A. 5
B. 7
C. 10
D. 12
Answer» D. 12
14.

A computer is a malicious code which self-replicates by copying itself to other programs.

A. program
B. virus
C. application
D. worm
Answer» C. application
15.

is the kind of firewall is connected between the device and the network connecting to internet.

A. hardware firewall
B. software firewall
C. stateful inspection firewall
D. microsoft firewall
Answer» B. software firewall
16.

Firewall examines each that are entering or leaving the internal network

A. emails users
B. updates
C. connections
D. data packets
Answer» E.
17.

Which of the following is not a software firewall?

A. windows firewall
B. outpost firewall pro
C. endian firewall
D. linksys firewall
Answer» E.
18.

Which of the following is a non-technical type of intrusion or attack technique?

A. reverse engineering
B. malware analysis
C. social engineering
D. malware writing
Answer» D. malware writing
19.

A firewall protects which of the following attacks?

A. phishing
B. dumpster diving
C. denial of service
D. shoulder surfing
Answer» D. shoulder surfing
20.

If the data stored in the is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie.

A. memory
B. quarantine
C. cookies
D. hard drive
Answer» D. hard drive
21.

The stored cookie which contains all your personal data about that website can be stolen away by using or trojans.

A. attackers, malware
B. hackers, antivirus
C. penetration testers, malware
D. penetration testers, virus
Answer» B. hackers, antivirus
22.

If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website.

A. true
B. false
Answer» B. false
23.

Which of them is not a proper method for email security?

A. use strong password
B. use email encryption
C. spam filters and malware scanners
D. click on unknown links to explore
Answer» E.
24.

What are email security services?

A. confidentiality
B. authentication
C. non-repudation of origin
D. all of the above
Answer» E.
25.

Who created PGP?

A. phil zimmermann
B. tim berners-lee
C. marc andreessen
D. ken thompson
Answer» B. tim berners-lee
26.

PGP makes use of which cryptographic algorithm?

A. des
B. aes
C. rsa
D. rabin
Answer» D. rabin
27.

PGP offers block ciphers for message encryption?

A. triple-des
B. cast
C. idea
D. all of the above
Answer» E.
28.

The process of writing the text as rows and read it as columns is known as

A. vernam cipher
B. ceaser cipher
C. transposition columnar cipher
D. homophonic substitution cipher
Answer» D. homophonic substitution cipher
29.

is used for hiding the payment information from the merchant.

A. set.
B. ssl.
C. shttp
D. tsp
Answer» B. ssl.
30.

PGP security system uses

A. public key cryptosystem
B. private key cryptosystem
C. public & private key cryptosystem
D. none of the mentioned
Answer» D. none of the mentioned
31.

S/MIME stands for .

A. standard multipurpose internet mail extensions.
B. secure multipurpose internet mail extensions.
C. secure multipurpose international mail extensions
D. standard multipurpose international mail extensions.
Answer» C. secure multipurpose international mail extensions
32.

The cryptography algorithms used in S/MIME are .

A. idea.
B. rc4
C. rsa,des-3
D. rc5
Answer» D. rc5
33.

In S/MIME,MLA stands for .

A. mailing list agent.
B. multipurpose list agent.
C. mail lock agent.
D. message link agen
Answer» B. multipurpose list agent.
34.

Which component is included in IP security?

A. authentication header (ah)
B. encapsulating security payload (esp)
C. internet key exchange (ike)
D. all of the mentioned
Answer» B. encapsulating security payload (esp)
35.

An attempt to make a computer resource unavailable to its intended users is called

A. denial-of-service attack
B. virus attack
C. worms attack
D. botnet process
Answer» B. virus attack
36.

IPSec is designed to provide security at the

A. transport layer
B. network layer
C. application layer
D. session layer
Answer» C. application layer
37.

PGP is used in

A. browser security
B. email security
C. ftp security
D. wifi security
Answer» C. ftp security
38.

RSA is also a stream cipher like Merkel-Hellman

A. true
B. false
Answer» B. false
39.

Biometric authentication works on the basis of

A. human characteristics
B. passwords
C. smart cards
D. pin
Answer» B. passwords
40.

Which layer filters the proxy firewall?

A. application
B. network
C. transport
D. none of the above
Answer» B. network
41.

In RSA, (n) = in terms of p and q

A. (p)/(q)
B. (p)(q)
C. (p-1)(q-1)
D. (p+1)(q+1)
Answer» D. (p+1)(q+1)
42.

In Asymmetric Key Cryptography, the two key, e and d, have a special relationship to

A. others
B. data
C. keys
D. each other
Answer» E.
43.

Using Rabin cryptosystem with p=23 and q=7 ,Encrypt P=24 to find ciphertext. The Cipher text is

A. 42
B. 93
C. 74
D. 12
Answer» E.
44.

Sender chooses p = 107, e1 = 2, d = 67, and the random integer is r=45. Find the plaintext to be transmitted if the ciphertext is (28,9)

A. 45
B. 76
C. 66
D. 13
Answer» D. 13
45.

Which of the following is not a type of symmetric-key cryptography technique?

A. caesar cipher
B. data encryption standard (des)
C. diffie hellman cipher
D. playfair cipher
Answer» D. playfair cipher
46.

In Asymmetric key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

A. short
B. long
C. flat
D. thin
Answer» C. flat
47.

In Elgamal cryptosystem, given the prime p=31,Choose e1= first primitive root of p and d=10, calculate e2

A. 24
B. 36
C. 25
D. 62
Answer» D. 62
48.

In Elgamal cryptosystem, given the prime p=31,Encrypt the message HELLO ; use 00 to 25 for encoding. The value of C2 for character O is

A. 9
B. 7
C. 23
D. 27
Answer» B. 7
49.

Computation of the discrete logarithm is the basis of the cryptographic system

A. symmetric cryptography
B. asymmetric cryptography
C. diffie-hellman key exchange
D. secret key cryptography
Answer» D. secret key cryptography
50.

What is the general equation for elliptic curve systems

A. y3+b_1 xy+b_2 y=x33+a_1 x2+a_2 x+a_3
B. y3+b_1 x+b_2 y=x2+a_1 x2+a_2 x+a_3
C. y2+b_1 xy+b_2 y=x3+a_1 x2+a_2
D. y2+b_1 xy+b_2 y=x3+a_1 x2+a_2 x+a_3
Answer» E.