Explore topic-wise MCQs in Information Technology Engineering (IT).

This section includes 42 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.

1.

ATM pin while withdrawing money is an example of using:

A. authentication
B. authorization
C. access control
D. auditing
Answer» C. access control
2.

Assurance that authentic user is taking part in communication is:

A. authentication
B. authorization
C. access control
D. auditing
Answer» B. authorization
3.

A process of making the encrypted text readable again.

A. decryption
B. encryption
C. network security
D. information hiding
Answer» B. encryption
4.

Modification of Data is done in:

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» B. neither active and passive attacks
5.

Which is the type of attack when Network is made unavailable for user

A. masquerade
B. replay
C. modification
D. denial of service
Answer» E.
6.

When original data is changed to make it non-meaningful by attacker it is known as

A. masquerade
B. replay
C. modification of messages
D. traffic analysis
Answer» D. traffic analysis
7.

                       attack is when original data is modified and malicious data is inserted

A. masquerade
B. replay(rewrite)
C. modification
D. traffic analysis
Answer» C. modification
8.

             means when an attacker pretends to be authentic user

A. masquerade
B. replay
C. modification
D. traffic analysis
Answer» B. replay
9.

Release of Message Content and Traffic analysis are type of :

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» E.
10.

3) Categories of Security Service

A. 1
B. 1 &3
C. 2& 3
D. 1,2,3
Answer» E.
11.

Which of the following attack can actively modify communications or data?

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» D. passive attacks
12.

What defines the restrictions on employees such as usage?

A. regulatory
B. advisory
C. availability
D. user policies
Answer» E.
13.

             Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior

A. regulatory
B. advisory
C. availability
D. user policies
Answer» C. availability
14.

           Policy ensures that the organization is maintaining standards set by specific industry regulation.

A. regulatory
B. advisory
C. availability
D. user policies
Answer» B. advisory
15.

Examples of User Policies is/are:

A. password policies
B. internet usage
C. system use
D. all of the above
Answer» E.
16.

Which of the following are not security policies?

A. regulatory
B. advisory
C. availability
D. user policies
Answer» D. user policies
17.

According to the CIA Triad, which of the below-mentioned element is not considered in the triad?

A. confidentiality
B. integrity
C. authenticity
D. availability
Answer» D. availability
18.

SSL provides .

A. message integrity
B. confidentiality
C. compression
D. all of the above
Answer» E.
19.

TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.

A. true
B. false
Answer» B. false
20.

                      is used for encrypting data at network level

A. ipsec
B. https
C. smtp
D. s/mime
Answer» B. https
21.

SSL primarily focuses on                   Pretty good privacy (PGP) is used in

A. integrity and authenticity
B. integrity and non- repudiation
C. authenticity and privacy
D. confidentiality and integrity
Answer» B. integrity and non- repudiation
22.

An attempt to make a computer resource unavailable to its intended users is called

A. denial-of-service attack
B. virus attack
C. worms attack
D. botnet process
Answer» B. virus attack
23.

WPA2 is used for security in

A. ethernet
B. wi-fi
C. bluetooth
D. e-mail
Answer» C. bluetooth
24.

HTTPS is abbreviated as

A. secured hyper hypertexts transfer text transfer protocol secured protocol
B. none of the mentioned
C. hyperlinked text transfer protocol secured
D. hyper text transfer protocol secure
Answer» E.
25.

IPSec is designed to provide security at the

A. transport layer
B. network layer
C. application layer
D. session layer
Answer» C. application layer
26.

In tunnel mode, IPSec protects the

A. entire ip packet
B. ip header
C. ip payload
D. ip trailer
Answer» B. ip header
27.

Diffie-Hellman algorithm is widely known as

A. key exchange algorithm
B. key agreement algorithm
C. only a
D. both a and b
Answer» E.
28.

RSA algorithm is best example of

A. asymmetric key cryptography
B. symmetric key cryptography
C. elliptic curve cryptography
D. all of the above
Answer» B. symmetric key cryptography
29.

Hash function is used for

A. message authentication
B. digital signature
C. both a and b
D. only a
Answer» D. only a
30.

Public key cryptography also called as

A. asymmetric key cryptography
B. symmetric key cryptography
C. both a and b
D. none of the above
Answer» B. symmetric key cryptography
31.

In RSA, Ф(n) = in terms of p and q.

A. (p)/(q)
B. (p)(q)
C. (p-1)(q-1)
D. (p+1)(q+1)
Answer» D. (p+1)(q+1)
32.

The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not

A. authenticated
B. joined
C. submit
D. separate
Answer» B. joined
33.

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

A. short
B. flat
C. long
D. thin
Answer» D. thin
34.

In asymmetric key cryptography, the private key is kept by

A. sender
B. receiver
C. sender and receiver
D. none of these
Answer» C. sender and receiver
35.

    is the practice of concealing a message within another message,image or file.

A. steganography
B. cryptography
C. cipher
D. receiver
Answer» B. cryptography
36.

The is a polygraphic substitution cipher based on linear algebra.

A. hill cipher
B. playfair cipher
C. affine cipher
D. none of these
Answer» B. playfair cipher
37.

Conversion of plain text into Cipher text is called as .

A. encryption
B. decryption
C. hidden text
D. none of above
Answer» B. decryption
38.

The model is 7 layer architecture where each layer is having some specific functionality to perform.

A. tcp
B. osi
C. ois
D. none of these
Answer» C. ois
39.

The full form of OSI is OSI model .

A. open systems interconnection
B. open software interconnection
C. open connection
D. open system internet
Answer» B. open software interconnection
40.

    is used to create the organisation's overall security program.

A. program policy
B. purpose
C. security
D. none of these
Answer» B. purpose
41.

                      means knowledge obtained from investigation, study , intelligence new ,facts .

A. security
B. data
C. information
D. none of these
Answer» D. none of these
42.

Security Measures Needed to protect during their transmission

A. file
B. data
C. packet
D. all of above
Answer» C. packet