MCQOPTIONS
Saved Bookmarks
This section includes 87 Mcqs, each offering curated multiple-choice questions to sharpen your Uncategorized topics knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
In Singular elliptic curve, the equation x^3+ax+b=0 does roots |
| A. | does not have three distinct |
| B. | has three distinct |
| C. | has three unique |
| D. | has three distinct unique |
| Answer» B. has three distinct | |
| 52. |
The value of 52003 mod 7 is(use fermat's theorem) |
| A. | 3 |
| B. | 4 |
| C. | 8 |
| D. | 9 |
| Answer» B. 4 | |
| 53. |
Elliptic curve cryptography follows the associative property |
| A. | true |
| B. | false |
| Answer» B. false | |
| 54. |
What is the number of possible 3 x 3 affine cipher transformations |
| A. | 168 |
| B. | 840 |
| C. | 1024 |
| D. | 1344 |
| Answer» E. | |
| 55. |
In public key cryptosystem keys are used for encryption and decryption. |
| A. | same |
| B. | different |
| C. | encryption keys |
| D. | none of the mentioned |
| Answer» C. encryption keys | |
| 56. |
is the technique used for tricking users to disclose their username and passwords through fake pages. |
| A. | social engineering |
| B. | phishing |
| C. | cookie stealing |
| D. | banner grabbing |
| Answer» C. cookie stealing | |
| 57. |
For the AES-128 algorithm there are similar rounds and round is different. |
| A. | 2 pair of 5 similar rounds ; every alternate |
| B. | 9 ; the last |
| C. | 8 ; the first and last |
| D. | 10 ; no |
| Answer» C. 8 ; the first and last | |
| 58. |
The DES Algorithm Cipher System consists of rounds (iterations) each with a round key |
| A. | 9 |
| B. | 12 |
| C. | 18 |
| D. | 16 |
| Answer» E. | |
| 59. |
In the DES algorithm the round key is bit and the Round Input is bits |
| A. | 48, 32 |
| B. | 64,32 |
| C. | 56, 24 |
| D. | 32, 32 |
| Answer» B. 64,32 | |
| 60. |
is not a binary operation on the set of natural numbers. |
| A. | addition |
| B. | product |
| C. | difference |
| D. | none |
| Answer» D. none | |
| 61. |
AES uses a bit block size and a key size of bits. |
| A. | 128; 128 or 256 |
| B. | 64; 128 or 192 |
| C. | 256; 128, 192, or 256 |
| D. | 128; 128, 192, or 256 |
| Answer» E. | |
| 62. |
Every cyclic group is . |
| A. | a group with finite order |
| B. | a group with prime order |
| C. | a non abelian group |
| D. | an abelian group |
| Answer» E. | |
| 63. |
Which of the following is group under multiplication? |
| A. | q |
| B. | q-{0} |
| C. | q-{1} |
| D. | q-{0,1} |
| Answer» C. q-{1} | |
| 64. |
In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via |
| A. | scaling of the existing bits |
| B. | duplication of the existing bits |
| C. | addition of zeros |
| D. | addition of ones |
| Answer» B. duplication of the existing bits | |
| 65. |
The sub key length at each round of DES is |
| A. | 32 |
| B. | 56 |
| C. | 48 |
| D. | 64 |
| Answer» C. 48 | |
| 66. |
Which of the following is a mode of operation for the Block ciphers in cryptography? |
| A. | a. electronic code book (ecb) |
| B. | cipher block chaining (cbc) |
| C. | counter (ctr) mode |
| D. | all of the above |
| Answer» E. | |
| 67. |
Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers? |
| A. | a. cbc (cipher block chaining) |
| B. | ecb (electronic code book) |
| C. | a. cfb (cipher text feed back) |
| D. | all of the above |
| Answer» D. all of the above | |
| 68. |
Public key encryption is advantageous over Symmetric key Cryptography because of |
| A. | speed |
| B. | space |
| C. | key exchange |
| D. | key length |
| Answer» D. key length | |
| 69. |
In Elgamal cryptosystem, given the prime p=31,What is the respective plaintext character for C = (27, 20)? |
| A. | h |
| B. | l |
| C. | o |
| D. | m |
| Answer» B. l | |
| 70. |
In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is 2P if P = (4, 3.464) |
| A. | (12.022, -39.362) |
| B. | (32.022, 42.249) |
| C. | (11.694, -43.723) |
| D. | (43.022, 39.362) |
| Answer» B. (32.022, 42.249) | |
| 71. |
There are major ways of stealing email information. |
| A. | 2 |
| B. | 3 |
| C. | 4 |
| D. | 5 |
| Answer» C. 4 | |
| 72. |
Which of them is not a major way of stealing email information? |
| A. | stealing cookies |
| B. | reverse engineering |
| C. | password phishing |
| D. | social engineering |
| Answer» C. password phishing | |
| 73. |
is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise. |
| A. | email security |
| B. | email hacking |
| C. | email protection |
| D. | email safeguarding |
| Answer» B. email hacking | |
| 74. |
is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks. |
| A. | cloud |
| B. | pen drive |
| C. | website |
| D. | |
| Answer» E. | |
| 75. |
Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as details and passwords. |
| A. | credit card, antivirus name |
| B. | credit card, login id |
| C. | cell phone, antivirus name |
| D. | car model, account id |
| Answer» C. cell phone, antivirus name | |
| 76. |
Unsolicited Bulk E-mails (UBI) are called |
| A. | sms |
| B. | mms |
| C. | spam emails |
| D. | malicious emails |
| Answer» D. malicious emails | |
| 77. |
Chosen cipher text attack is based on |
| A. | cryptanalysis |
| B. | cryptography |
| C. | encryption |
| D. | decryption |
| Answer» B. cryptography | |
| 78. |
Interception is an attack on |
| A. | availability |
| B. | confidentiality |
| C. | integrity |
| D. | authenticity |
| Answer» C. integrity | |
| 79. |
Which one of the following is not a cryptographic algorithm? |
| A. | jupiter |
| B. | blowfish |
| C. | serpent |
| D. | none |
| Answer» B. blowfish | |
| 80. |
Which one is the strong attack mechanism? |
| A. | chosen plaintext attack |
| B. | chosen cipher text |
| C. | brute force attack |
| D. | man in the middle attack |
| Answer» D. man in the middle attack | |
| 81. |
. Rail Fence Technique is an example of |
| A. | substitution |
| B. | transposition |
| C. | product cipher |
| D. | ceaser cipher |
| Answer» C. product cipher | |
| 82. |
Which of the following is not a strong security protocol? |
| A. | https |
| B. | ssl |
| C. | smtp |
| D. | sftp |
| Answer» D. sftp | |
| 83. |
Using email hacking illicit hackers can send & spread virus and spam emails. |
| A. | trojans, redirected malicious urls |
| B. | antivirus, patches |
| C. | cracked software, redirected malicious urls |
| D. | malware, security patches |
| Answer» B. antivirus, patches | |
| 84. |
Which of them is an example of grabbing email information? |
| A. | cookie stealing |
| B. | reverse engineering |
| C. | port scanning |
| D. | banner grabbing |
| Answer» B. reverse engineering | |
| 85. |
SSL primarily focuses on |
| A. | integrity and authenticity |
| B. | integrity and non-repudiation |
| C. | authenticity and privacy |
| D. | confidentiality and integrity |
| Answer» B. integrity and non-repudiation | |
| 86. |
Packet filtering firewalls are deployed on |
| A. | routers |
| B. | switches |
| C. | hubs |
| D. | repeaters |
| Answer» B. switches | |
| 87. |
Why did SSL certificate require in HTTP? |
| A. | for making security weak |
| B. | for making information move faster |
| C. | for encrypted data sent over http protocol |
| D. | for sending and receiving emails unencrypted |
| Answer» D. for sending and receiving emails unencrypted | |