MCQOPTIONS
Saved Bookmarks
This section includes 87 Mcqs, each offering curated multiple-choice questions to sharpen your Uncategorized topics knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
We use cryptofraphy term to transform messages to make them secure and immune to |
| A. | change |
| B. | idle |
| C. | attacks |
| D. | defend |
| Answer» D. defend | |
| 2. |
A straight permutation cipher or a straight p-box has the same number of input as |
| A. | cipher |
| B. | frames |
| C. | outputs |
| D. | bits |
| Answer» D. bits | |
| 3. |
In cryptography , the original message before being transformmed , is called |
| A. | simple text |
| B. | plain text |
| C. | empty text |
| D. | filled text |
| Answer» C. empty text | |
| 4. |
The man-in-the-middle attack can endanger the security of the diffie-hellman if two parties are not |
| A. | authenticated |
| B. | joined |
| C. | submit |
| D. | separate |
| Answer» B. joined | |
| 5. |
Encryption Strength is based on |
| A. | strength of algorithm |
| B. | secrecy of key |
| C. | length of key |
| D. | all of the above |
| Answer» E. | |
| 6. |
TCP/IP model does not have layer but OSI model have this layer. |
| A. | session layer |
| B. | transport layer |
| C. | application layer |
| D. | network layer |
| Answer» B. transport layer | |
| 7. |
In cryptography, the order of the letters in a message is rearranged by |
| A. | transpositional ciphers |
| B. | substitution ciphers |
| C. | both |
| D. | quadratic ciphers |
| Answer» B. substitution ciphers | |
| 8. |
SFTP is abbreviated as |
| A. | secure file transfer protocol |
| B. | secured file transfer protocol |
| C. | secure folder transfer protocol |
| D. | secure file transferring protoco |
| Answer» B. secured file transfer protocol | |
| 9. |
mointors user activity on internet and transmit that information in the background to someone else |
| A. | malware |
| B. | spyware |
| C. | adware |
| D. | none of these |
| Answer» C. adware | |
| 10. |
The full form of Malware is |
| A. | malfunctioned software |
| B. | multipurpose software |
| C. | malicious software |
| D. | malfunctioning of security |
| Answer» D. malfunctioning of security | |
| 11. |
Firewall is type of------ |
| A. | virus |
| B. | security threat |
| C. | worm |
| D. | none of these |
| Answer» E. | |
| 12. |
Which of them is not an ideal way of spreading the virus? |
| A. | infected website |
| B. | e-mails |
| C. | official antivirus cds |
| D. | usbs |
| Answer» D. usbs | |
| 13. |
There are types of computer virus. |
| A. | 5 |
| B. | 7 |
| C. | 10 |
| D. | 12 |
| Answer» D. 12 | |
| 14. |
A computer is a malicious code which self-replicates by copying itself to other programs. |
| A. | program |
| B. | virus |
| C. | application |
| D. | worm |
| Answer» C. application | |
| 15. |
is the kind of firewall is connected between the device and the network connecting to internet. |
| A. | hardware firewall |
| B. | software firewall |
| C. | stateful inspection firewall |
| D. | microsoft firewall |
| Answer» B. software firewall | |
| 16. |
Firewall examines each that are entering or leaving the internal network |
| A. | emails users |
| B. | updates |
| C. | connections |
| D. | data packets |
| Answer» E. | |
| 17. |
Which of the following is not a software firewall? |
| A. | windows firewall |
| B. | outpost firewall pro |
| C. | endian firewall |
| D. | linksys firewall |
| Answer» E. | |
| 18. |
Which of the following is a non-technical type of intrusion or attack technique? |
| A. | reverse engineering |
| B. | malware analysis |
| C. | social engineering |
| D. | malware writing |
| Answer» D. malware writing | |
| 19. |
A firewall protects which of the following attacks? |
| A. | phishing |
| B. | dumpster diving |
| C. | denial of service |
| D. | shoulder surfing |
| Answer» D. shoulder surfing | |
| 20. |
If the data stored in the is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie. |
| A. | memory |
| B. | quarantine |
| C. | cookies |
| D. | hard drive |
| Answer» D. hard drive | |
| 21. |
The stored cookie which contains all your personal data about that website can be stolen away by using or trojans. |
| A. | attackers, malware |
| B. | hackers, antivirus |
| C. | penetration testers, malware |
| D. | penetration testers, virus |
| Answer» B. hackers, antivirus | |
| 22. |
If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 23. |
Which of them is not a proper method for email security? |
| A. | use strong password |
| B. | use email encryption |
| C. | spam filters and malware scanners |
| D. | click on unknown links to explore |
| Answer» E. | |
| 24. |
What are email security services? |
| A. | confidentiality |
| B. | authentication |
| C. | non-repudation of origin |
| D. | all of the above |
| Answer» E. | |
| 25. |
Who created PGP? |
| A. | phil zimmermann |
| B. | tim berners-lee |
| C. | marc andreessen |
| D. | ken thompson |
| Answer» B. tim berners-lee | |
| 26. |
PGP makes use of which cryptographic algorithm? |
| A. | des |
| B. | aes |
| C. | rsa |
| D. | rabin |
| Answer» D. rabin | |
| 27. |
PGP offers block ciphers for message encryption? |
| A. | triple-des |
| B. | cast |
| C. | idea |
| D. | all of the above |
| Answer» E. | |
| 28. |
The process of writing the text as rows and read it as columns is known as |
| A. | vernam cipher |
| B. | ceaser cipher |
| C. | transposition columnar cipher |
| D. | homophonic substitution cipher |
| Answer» D. homophonic substitution cipher | |
| 29. |
is used for hiding the payment information from the merchant. |
| A. | set. |
| B. | ssl. |
| C. | shttp |
| D. | tsp |
| Answer» B. ssl. | |
| 30. |
PGP security system uses |
| A. | public key cryptosystem |
| B. | private key cryptosystem |
| C. | public & private key cryptosystem |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 31. |
S/MIME stands for . |
| A. | standard multipurpose internet mail extensions. |
| B. | secure multipurpose internet mail extensions. |
| C. | secure multipurpose international mail extensions |
| D. | standard multipurpose international mail extensions. |
| Answer» C. secure multipurpose international mail extensions | |
| 32. |
The cryptography algorithms used in S/MIME are . |
| A. | idea. |
| B. | rc4 |
| C. | rsa,des-3 |
| D. | rc5 |
| Answer» D. rc5 | |
| 33. |
In S/MIME,MLA stands for . |
| A. | mailing list agent. |
| B. | multipurpose list agent. |
| C. | mail lock agent. |
| D. | message link agen |
| Answer» B. multipurpose list agent. | |
| 34. |
Which component is included in IP security? |
| A. | authentication header (ah) |
| B. | encapsulating security payload (esp) |
| C. | internet key exchange (ike) |
| D. | all of the mentioned |
| Answer» B. encapsulating security payload (esp) | |
| 35. |
An attempt to make a computer resource unavailable to its intended users is called |
| A. | denial-of-service attack |
| B. | virus attack |
| C. | worms attack |
| D. | botnet process |
| Answer» B. virus attack | |
| 36. |
IPSec is designed to provide security at the |
| A. | transport layer |
| B. | network layer |
| C. | application layer |
| D. | session layer |
| Answer» C. application layer | |
| 37. |
PGP is used in |
| A. | browser security |
| B. | email security |
| C. | ftp security |
| D. | wifi security |
| Answer» C. ftp security | |
| 38. |
RSA is also a stream cipher like Merkel-Hellman |
| A. | true |
| B. | false |
| Answer» B. false | |
| 39. |
Biometric authentication works on the basis of |
| A. | human characteristics |
| B. | passwords |
| C. | smart cards |
| D. | pin |
| Answer» B. passwords | |
| 40. |
Which layer filters the proxy firewall? |
| A. | application |
| B. | network |
| C. | transport |
| D. | none of the above |
| Answer» B. network | |
| 41. |
In RSA, (n) = in terms of p and q |
| A. | (p)/(q) |
| B. | (p)(q) |
| C. | (p-1)(q-1) |
| D. | (p+1)(q+1) |
| Answer» D. (p+1)(q+1) | |
| 42. |
In Asymmetric Key Cryptography, the two key, e and d, have a special relationship to |
| A. | others |
| B. | data |
| C. | keys |
| D. | each other |
| Answer» E. | |
| 43. |
Using Rabin cryptosystem with p=23 and q=7 ,Encrypt P=24 to find ciphertext. The Cipher text is |
| A. | 42 |
| B. | 93 |
| C. | 74 |
| D. | 12 |
| Answer» E. | |
| 44. |
Sender chooses p = 107, e1 = 2, d = 67, and the random integer is r=45. Find the plaintext to be transmitted if the ciphertext is (28,9) |
| A. | 45 |
| B. | 76 |
| C. | 66 |
| D. | 13 |
| Answer» D. 13 | |
| 45. |
Which of the following is not a type of symmetric-key cryptography technique? |
| A. | caesar cipher |
| B. | data encryption standard (des) |
| C. | diffie hellman cipher |
| D. | playfair cipher |
| Answer» D. playfair cipher | |
| 46. |
In Asymmetric key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is |
| A. | short |
| B. | long |
| C. | flat |
| D. | thin |
| Answer» C. flat | |
| 47. |
In Elgamal cryptosystem, given the prime p=31,Choose e1= first primitive root of p and d=10, calculate e2 |
| A. | 24 |
| B. | 36 |
| C. | 25 |
| D. | 62 |
| Answer» D. 62 | |
| 48. |
In Elgamal cryptosystem, given the prime p=31,Encrypt the message HELLO ; use 00 to 25 for encoding. The value of C2 for character O is |
| A. | 9 |
| B. | 7 |
| C. | 23 |
| D. | 27 |
| Answer» B. 7 | |
| 49. |
Computation of the discrete logarithm is the basis of the cryptographic system |
| A. | symmetric cryptography |
| B. | asymmetric cryptography |
| C. | diffie-hellman key exchange |
| D. | secret key cryptography |
| Answer» D. secret key cryptography | |
| 50. |
What is the general equation for elliptic curve systems |
| A. | y3+b_1 xy+b_2 y=x33+a_1 x2+a_2 x+a_3 |
| B. | y3+b_1 x+b_2 y=x2+a_1 x2+a_2 x+a_3 |
| C. | y2+b_1 xy+b_2 y=x3+a_1 x2+a_2 |
| D. | y2+b_1 xy+b_2 y=x3+a_1 x2+a_2 x+a_3 |
| Answer» E. | |