

MCQOPTIONS
Saved Bookmarks
This section includes 87 Mcqs, each offering curated multiple-choice questions to sharpen your Uncategorized topics knowledge and support exam preparation. Choose a topic below to get started.
1. |
We use cryptofraphy term to transform messages to make them secure and immune to |
A. | change |
B. | idle |
C. | attacks |
D. | defend |
Answer» D. defend | |
2. |
A straight permutation cipher or a straight p-box has the same number of input as |
A. | cipher |
B. | frames |
C. | outputs |
D. | bits |
Answer» D. bits | |
3. |
In cryptography , the original message before being transformmed , is called |
A. | simple text |
B. | plain text |
C. | empty text |
D. | filled text |
Answer» C. empty text | |
4. |
The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not |
A. | authenticated |
B. | joined |
C. | submit |
D. | separate |
Answer» B. joined | |
5. |
Encryption Strength is based on |
A. | strength of algorithm |
B. | secrecy of key |
C. | length of key |
D. | all of the above |
Answer» E. | |
6. |
TCP/IP model does not have layer but OSI model have this layer. |
A. | session layer |
B. | transport layer |
C. | application layer |
D. | network layer |
Answer» B. transport layer | |
7. |
In cryptography, the order of the letters in a message is rearranged by |
A. | transpositional ciphers |
B. | substitution ciphers |
C. | both |
D. | quadratic ciphers |
Answer» B. substitution ciphers | |
8. |
SFTP is abbreviated as |
A. | secure file transfer protocol |
B. | secured file transfer protocol |
C. | secure folder transfer protocol |
D. | secure file transferring protoco |
Answer» B. secured file transfer protocol | |
9. |
mointors user activity on internet and transmit that information in the background to someone else |
A. | malware |
B. | spyware |
C. | adware |
D. | none of these |
Answer» C. adware | |
10. |
The full form of Malware is |
A. | malfunctioned software |
B. | multipurpose software |
C. | malicious software |
D. | malfunctioning of security |
Answer» D. malfunctioning of security | |
11. |
Firewall is type of------ |
A. | virus |
B. | security threat |
C. | worm |
D. | none of these |
Answer» E. | |
12. |
Which of them is not an ideal way of spreading the virus? |
A. | infected website |
B. | e-mails |
C. | official antivirus cds |
D. | usbs |
Answer» D. usbs | |
13. |
There are types of computer virus. |
A. | 5 |
B. | 7 |
C. | 10 |
D. | 12 |
Answer» D. 12 | |
14. |
A computer is a malicious code which self-replicates by copying itself to other programs. |
A. | program |
B. | virus |
C. | application |
D. | worm |
Answer» C. application | |
15. |
is the kind of firewall is connected between the device and the network connecting to internet. |
A. | hardware firewall |
B. | software firewall |
C. | stateful inspection firewall |
D. | microsoft firewall |
Answer» B. software firewall | |
16. |
Firewall examines each that are entering or leaving the internal network |
A. | emails users |
B. | updates |
C. | connections |
D. | data packets |
Answer» E. | |
17. |
Which of the following is not a software firewall? |
A. | windows firewall |
B. | outpost firewall pro |
C. | endian firewall |
D. | linksys firewall |
Answer» E. | |
18. |
Which of the following is a non-technical type of intrusion or attack technique? |
A. | reverse engineering |
B. | malware analysis |
C. | social engineering |
D. | malware writing |
Answer» D. malware writing | |
19. |
A firewall protects which of the following attacks? |
A. | phishing |
B. | dumpster diving |
C. | denial of service |
D. | shoulder surfing |
Answer» D. shoulder surfing | |
20. |
If the data stored in the is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie. |
A. | memory |
B. | quarantine |
C. | cookies |
D. | hard drive |
Answer» D. hard drive | |
21. |
The stored cookie which contains all your personal data about that website can be stolen away by using or trojans. |
A. | attackers, malware |
B. | hackers, antivirus |
C. | penetration testers, malware |
D. | penetration testers, virus |
Answer» B. hackers, antivirus | |
22. |
If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. |
A. | true |
B. | false |
Answer» B. false | |
23. |
Which of them is not a proper method for email security? |
A. | use strong password |
B. | use email encryption |
C. | spam filters and malware scanners |
D. | click on unknown links to explore |
Answer» E. | |
24. |
What are email security services? |
A. | confidentiality |
B. | authentication |
C. | non-repudation of origin |
D. | all of the above |
Answer» E. | |
25. |
Who created PGP? |
A. | phil zimmermann |
B. | tim berners-lee |
C. | marc andreessen |
D. | ken thompson |
Answer» B. tim berners-lee | |
26. |
PGP makes use of which cryptographic algorithm? |
A. | des |
B. | aes |
C. | rsa |
D. | rabin |
Answer» D. rabin | |
27. |
PGP offers block ciphers for message encryption? |
A. | triple-des |
B. | cast |
C. | idea |
D. | all of the above |
Answer» E. | |
28. |
The process of writing the text as rows and read it as columns is known as |
A. | vernam cipher |
B. | ceaser cipher |
C. | transposition columnar cipher |
D. | homophonic substitution cipher |
Answer» D. homophonic substitution cipher | |
29. |
is used for hiding the payment information from the merchant. |
A. | set. |
B. | ssl. |
C. | shttp |
D. | tsp |
Answer» B. ssl. | |
30. |
PGP security system uses |
A. | public key cryptosystem |
B. | private key cryptosystem |
C. | public & private key cryptosystem |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
31. |
S/MIME stands for . |
A. | standard multipurpose internet mail extensions. |
B. | secure multipurpose internet mail extensions. |
C. | secure multipurpose international mail extensions |
D. | standard multipurpose international mail extensions. |
Answer» C. secure multipurpose international mail extensions | |
32. |
The cryptography algorithms used in S/MIME are . |
A. | idea. |
B. | rc4 |
C. | rsa,des-3 |
D. | rc5 |
Answer» D. rc5 | |
33. |
In S/MIME,MLA stands for . |
A. | mailing list agent. |
B. | multipurpose list agent. |
C. | mail lock agent. |
D. | message link agen |
Answer» B. multipurpose list agent. | |
34. |
Which component is included in IP security? |
A. | authentication header (ah) |
B. | encapsulating security payload (esp) |
C. | internet key exchange (ike) |
D. | all of the mentioned |
Answer» B. encapsulating security payload (esp) | |
35. |
An attempt to make a computer resource unavailable to its intended users is called |
A. | denial-of-service attack |
B. | virus attack |
C. | worms attack |
D. | botnet process |
Answer» B. virus attack | |
36. |
IPSec is designed to provide security at the |
A. | transport layer |
B. | network layer |
C. | application layer |
D. | session layer |
Answer» C. application layer | |
37. |
PGP is used in |
A. | browser security |
B. | email security |
C. | ftp security |
D. | wifi security |
Answer» C. ftp security | |
38. |
RSA is also a stream cipher like Merkel-Hellman |
A. | true |
B. | false |
Answer» B. false | |
39. |
Biometric authentication works on the basis of |
A. | human characteristics |
B. | passwords |
C. | smart cards |
D. | pin |
Answer» B. passwords | |
40. |
Which layer filters the proxy firewall? |
A. | application |
B. | network |
C. | transport |
D. | none of the above |
Answer» B. network | |
41. |
In RSA, (n) = in terms of p and q |
A. | (p)/(q) |
B. | (p)(q) |
C. | (p-1)(q-1) |
D. | (p+1)(q+1) |
Answer» D. (p+1)(q+1) | |
42. |
In Asymmetric Key Cryptography, the two key, e and d, have a special relationship to |
A. | others |
B. | data |
C. | keys |
D. | each other |
Answer» E. | |
43. |
Using Rabin cryptosystem with p=23 and q=7 ,Encrypt P=24 to find ciphertext. The Cipher text is |
A. | 42 |
B. | 93 |
C. | 74 |
D. | 12 |
Answer» E. | |
44. |
Sender chooses p = 107, e1 = 2, d = 67, and the random integer is r=45. Find the plaintext to be transmitted if the ciphertext is (28,9) |
A. | 45 |
B. | 76 |
C. | 66 |
D. | 13 |
Answer» D. 13 | |
45. |
Which of the following is not a type of symmetric-key cryptography technique? |
A. | caesar cipher |
B. | data encryption standard (des) |
C. | diffie hellman cipher |
D. | playfair cipher |
Answer» D. playfair cipher | |
46. |
In Asymmetric key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is |
A. | short |
B. | long |
C. | flat |
D. | thin |
Answer» C. flat | |
47. |
In Elgamal cryptosystem, given the prime p=31,Choose e1= first primitive root of p and d=10, calculate e2 |
A. | 24 |
B. | 36 |
C. | 25 |
D. | 62 |
Answer» D. 62 | |
48. |
In Elgamal cryptosystem, given the prime p=31,Encrypt the message HELLO ; use 00 to 25 for encoding. The value of C2 for character O is |
A. | 9 |
B. | 7 |
C. | 23 |
D. | 27 |
Answer» B. 7 | |
49. |
Computation of the discrete logarithm is the basis of the cryptographic system |
A. | symmetric cryptography |
B. | asymmetric cryptography |
C. | diffie-hellman key exchange |
D. | secret key cryptography |
Answer» D. secret key cryptography | |
50. |
What is the general equation for elliptic curve systems |
A. | y3+b_1 xy+b_2 y=x33+a_1 x2+a_2 x+a_3 |
B. | y3+b_1 x+b_2 y=x2+a_1 x2+a_2 x+a_3 |
C. | y2+b_1 xy+b_2 y=x3+a_1 x2+a_2 |
D. | y2+b_1 xy+b_2 y=x3+a_1 x2+a_2 x+a_3 |
Answer» E. | |