Explore topic-wise MCQs in Uncategorized topics.

This section includes 87 Mcqs, each offering curated multiple-choice questions to sharpen your Uncategorized topics knowledge and support exam preparation. Choose a topic below to get started.

51.

In Singular elliptic curve, the equation x^3+ax+b=0 does roots

A. does not have three distinct
B. has three distinct
C. has three unique
D. has three distinct unique
Answer» B. has three distinct
52.

The value of 52003 mod 7 is(use fermat's theorem)

A. 3
B. 4
C. 8
D. 9
Answer» B. 4
53.

Elliptic curve cryptography follows the associative property

A. true
B. false
Answer» B. false
54.

What is the number of possible 3 x 3 affine cipher transformations

A. 168
B. 840
C. 1024
D. 1344
Answer» E.
55.

In public key cryptosystem keys are used for encryption and decryption.

A. same
B. different
C. encryption keys
D. none of the mentioned
Answer» C. encryption keys
56.

is the technique used for tricking users to disclose their username and passwords through fake pages.

A. social engineering
B. phishing
C. cookie stealing
D. banner grabbing
Answer» C. cookie stealing
57.

For the AES-128 algorithm there are similar rounds and round is different.

A. 2 pair of 5 similar rounds ; every alternate
B. 9 ; the last
C. 8 ; the first and last
D. 10 ; no
Answer» C. 8 ; the first and last
58.

The DES Algorithm Cipher System consists of rounds (iterations) each with a round key

A. 9
B. 12
C. 18
D. 16
Answer» E.
59.

In the DES algorithm the round key is bit and the Round Input is bits

A. 48, 32
B. 64,32
C. 56, 24
D. 32, 32
Answer» B. 64,32
60.

is not a binary operation on the set of natural numbers.

A. addition
B. product
C. difference
D. none
Answer» D. none
61.

AES uses a bit block size and a key size of bits.

A. 128; 128 or 256
B. 64; 128 or 192
C. 256; 128, 192, or 256
D. 128; 128, 192, or 256
Answer» E.
62.

Every cyclic group is .

A. a group with finite order
B. a group with prime order
C. a non abelian group
D. an abelian group
Answer» E.
63.

Which of the following is group under multiplication?

A. q
B. q-{0}
C. q-{1}
D. q-{0,1}
Answer» C. q-{1}
64.

In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via

A. scaling of the existing bits
B. duplication of the existing bits
C. addition of zeros
D. addition of ones
Answer» B. duplication of the existing bits
65.

The sub key length at each round of DES is

A. 32
B. 56
C. 48
D. 64
Answer» C. 48
66.

Which of the following is a mode of operation for the Block ciphers in cryptography?

A. a. electronic code book (ecb)
B. cipher block chaining (cbc)
C. counter (ctr) mode
D. all of the above
Answer» E.
67.

Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?

A. a. cbc (cipher block chaining)
B. ecb (electronic code book)
C. a. cfb (cipher text feed back)
D. all of the above
Answer» D. all of the above
68.

Public key encryption is advantageous over Symmetric key Cryptography because of

A. speed
B. space
C. key exchange
D. key length
Answer» D. key length
69.

In Elgamal cryptosystem, given the prime p=31,What is the respective plaintext character for C = (27, 20)?

A. h
B. l
C. o
D. m
Answer» B. l
70.

In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is 2P if P = (4, 3.464)

A. (12.022, -39.362)
B. (32.022, 42.249)
C. (11.694, -43.723)
D. (43.022, 39.362)
Answer» B. (32.022, 42.249)
71.

There are major ways of stealing email information.

A. 2
B. 3
C. 4
D. 5
Answer» C. 4
72.

Which of them is not a major way of stealing email information?

A. stealing cookies
B. reverse engineering
C. password phishing
D. social engineering
Answer» C. password phishing
73.

is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise.

A. email security
B. email hacking
C. email protection
D. email safeguarding
Answer» B. email hacking
74.

is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.

A. cloud
B. pen drive
C. website
D. email
Answer» E.
75.

Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as details and passwords.

A. credit card, antivirus name
B. credit card, login id
C. cell phone, antivirus name
D. car model, account id
Answer» C. cell phone, antivirus name
76.

Unsolicited Bulk E-mails (UBI) are called

A. sms
B. mms
C. spam emails
D. malicious emails
Answer» D. malicious emails
77.

Chosen cipher text attack is based on

A. cryptanalysis
B. cryptography
C. encryption
D. decryption
Answer» B. cryptography
78.

Interception is an attack on

A. availability
B. confidentiality
C. integrity
D. authenticity
Answer» C. integrity
79.

Which one of the following is not a cryptographic algorithm?

A. jupiter
B. blowfish
C. serpent
D. none
Answer» B. blowfish
80.

Which one is the strong attack mechanism?

A. chosen plaintext attack
B. chosen cipher text
C. brute force attack
D. man in the middle attack
Answer» D. man in the middle attack
81.

. Rail Fence Technique is an example of

A. substitution
B. transposition
C. product cipher
D. ceaser cipher
Answer» C. product cipher
82.

Which of the following is not a strong security protocol?

A. https
B. ssl
C. smtp
D. sftp
Answer» D. sftp
83.

Using email hacking illicit hackers can send & spread virus and spam emails.

A. trojans, redirected malicious urls
B. antivirus, patches
C. cracked software, redirected malicious urls
D. malware, security patches
Answer» B. antivirus, patches
84.

Which of them is an example of grabbing email information?

A. cookie stealing
B. reverse engineering
C. port scanning
D. banner grabbing
Answer» B. reverse engineering
85.

SSL primarily focuses on

A. integrity and authenticity
B. integrity and non-repudiation
C. authenticity and privacy
D. confidentiality and integrity
Answer» B. integrity and non-repudiation
86.

Packet filtering firewalls are deployed on

A. routers
B. switches
C. hubs
D. repeaters
Answer» B. switches
87.

Why did SSL certificate require in HTTP?

A. for making security weak
B. for making information move faster
C. for encrypted data sent over http protocol
D. for sending and receiving emails unencrypted
Answer» D. for sending and receiving emails unencrypted