MCQOPTIONS
Saved Bookmarks
This section includes 42 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
ATM pin while withdrawing money is an example of using: |
| A. | authentication |
| B. | authorization |
| C. | access control |
| D. | auditing |
| Answer» C. access control | |
| 2. |
Assurance that authentic user is taking part in communication is: |
| A. | authentication |
| B. | authorization |
| C. | access control |
| D. | auditing |
| Answer» B. authorization | |
| 3. |
A process of making the encrypted text readable again. |
| A. | decryption |
| B. | encryption |
| C. | network security |
| D. | information hiding |
| Answer» B. encryption | |
| 4. |
Modification of Data is done in: |
| A. | both active and passive attacks |
| B. | neither active and passive attacks |
| C. | active attacks |
| D. | passive attacks |
| Answer» B. neither active and passive attacks | |
| 5. |
Which is the type of attack when Network is made unavailable for user |
| A. | masquerade |
| B. | replay |
| C. | modification |
| D. | denial of service |
| Answer» E. | |
| 6. |
When original data is changed to make it non-meaningful by attacker it is known as |
| A. | masquerade |
| B. | replay |
| C. | modification of messages |
| D. | traffic analysis |
| Answer» D. traffic analysis | |
| 7. |
                       attack is when original data is modified and malicious data is inserted |
| A. | masquerade |
| B. | replay(rewrite) |
| C. | modification |
| D. | traffic analysis |
| Answer» C. modification | |
| 8. |
             means when an attacker pretends to be authentic user |
| A. | masquerade |
| B. | replay |
| C. | modification |
| D. | traffic analysis |
| Answer» B. replay | |
| 9. |
Release of Message Content and Traffic analysis are type of : |
| A. | both active and passive attacks |
| B. | neither active and passive attacks |
| C. | active attacks |
| D. | passive attacks |
| Answer» E. | |
| 10. |
3) Categories of Security Service |
| A. | 1 |
| B. | 1 &3 |
| C. | 2& 3 |
| D. | 1,2,3 |
| Answer» E. | |
| 11. |
Which of the following attack can actively modify communications or data? |
| A. | both active and passive attacks |
| B. | neither active and passive attacks |
| C. | active attacks |
| D. | passive attacks |
| Answer» D. passive attacks | |
| 12. |
What defines the restrictions on employees such as usage? |
| A. | regulatory |
| B. | advisory |
| C. | availability |
| D. | user policies |
| Answer» E. | |
| 13. |
             Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior |
| A. | regulatory |
| B. | advisory |
| C. | availability |
| D. | user policies |
| Answer» C. availability | |
| 14. |
           Policy ensures that the organization is maintaining standards set by specific industry regulation. |
| A. | regulatory |
| B. | advisory |
| C. | availability |
| D. | user policies |
| Answer» B. advisory | |
| 15. |
Examples of User Policies is/are: |
| A. | password policies |
| B. | internet usage |
| C. | system use |
| D. | all of the above |
| Answer» E. | |
| 16. |
Which of the following are not security policies? |
| A. | regulatory |
| B. | advisory |
| C. | availability |
| D. | user policies |
| Answer» D. user policies | |
| 17. |
According to the CIA Triad, which of the below-mentioned element is not considered in the triad? |
| A. | confidentiality |
| B. | integrity |
| C. | authenticity |
| D. | availability |
| Answer» D. availability | |
| 18. |
SSL provides . |
| A. | message integrity |
| B. | confidentiality |
| C. | compression |
| D. | all of the above |
| Answer» E. | |
| 19. |
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 20. |
                      is used for encrypting data at network level |
| A. | ipsec |
| B. | https |
| C. | smtp |
| D. | s/mime |
| Answer» B. https | |
| 21. |
SSL primarily focuses on                  Pretty good privacy (PGP) is used in |
| A. | integrity and authenticity |
| B. | integrity and non- repudiation |
| C. | authenticity and privacy |
| D. | confidentiality and integrity |
| Answer» B. integrity and non- repudiation | |
| 22. |
An attempt to make a computer resource unavailable to its intended users is called |
| A. | denial-of-service attack |
| B. | virus attack |
| C. | worms attack |
| D. | botnet process |
| Answer» B. virus attack | |
| 23. |
WPA2 is used for security in |
| A. | ethernet |
| B. | wi-fi |
| C. | bluetooth |
| D. | |
| Answer» C. bluetooth | |
| 24. |
HTTPS is abbreviated as |
| A. | secured hyper hypertexts transfer text transfer protocol secured protocol |
| B. | none of the mentioned |
| C. | hyperlinked text transfer protocol secured |
| D. | hyper text transfer protocol secure |
| Answer» E. | |
| 25. |
IPSec is designed to provide security at the |
| A. | transport layer |
| B. | network layer |
| C. | application layer |
| D. | session layer |
| Answer» C. application layer | |
| 26. |
In tunnel mode, IPSec protects the |
| A. | entire ip packet |
| B. | ip header |
| C. | ip payload |
| D. | ip trailer |
| Answer» B. ip header | |
| 27. |
Diffie-Hellman algorithm is widely known as |
| A. | key exchange algorithm |
| B. | key agreement algorithm |
| C. | only a |
| D. | both a and b |
| Answer» E. | |
| 28. |
RSA algorithm is best example of |
| A. | asymmetric key cryptography |
| B. | symmetric key cryptography |
| C. | elliptic curve cryptography |
| D. | all of the above |
| Answer» B. symmetric key cryptography | |
| 29. |
Hash function is used for |
| A. | message authentication |
| B. | digital signature |
| C. | both a and b |
| D. | only a |
| Answer» D. only a | |
| 30. |
Public key cryptography also called as |
| A. | asymmetric key cryptography |
| B. | symmetric key cryptography |
| C. | both a and b |
| D. | none of the above |
| Answer» B. symmetric key cryptography | |
| 31. |
In RSA, Ф(n) = in terms of p and q. |
| A. | (p)/(q) |
| B. | (p)(q) |
| C. | (p-1)(q-1) |
| D. | (p+1)(q+1) |
| Answer» D. (p+1)(q+1) | |
| 32. |
The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not |
| A. | authenticated |
| B. | joined |
| C. | submit |
| D. | separate |
| Answer» B. joined | |
| 33. |
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is |
| A. | short |
| B. | flat |
| C. | long |
| D. | thin |
| Answer» D. thin | |
| 34. |
In asymmetric key cryptography, the private key is kept by |
| A. | sender |
| B. | receiver |
| C. | sender and receiver |
| D. | none of these |
| Answer» C. sender and receiver | |
| 35. |
    is the practice of concealing a message within another message,image or file. |
| A. | steganography |
| B. | cryptography |
| C. | cipher |
| D. | receiver |
| Answer» B. cryptography | |
| 36. |
The is a polygraphic substitution cipher based on linear algebra. |
| A. | hill cipher |
| B. | playfair cipher |
| C. | affine cipher |
| D. | none of these |
| Answer» B. playfair cipher | |
| 37. |
Conversion of plain text into Cipher text is called as . |
| A. | encryption |
| B. | decryption |
| C. | hidden text |
| D. | none of above |
| Answer» B. decryption | |
| 38. |
The model is 7 layer architecture where each layer is having some specific functionality to perform. |
| A. | tcp |
| B. | osi |
| C. | ois |
| D. | none of these |
| Answer» C. ois | |
| 39. |
The full form of OSI is OSI model . |
| A. | open systems interconnection |
| B. | open software interconnection |
| C. | open connection |
| D. | open system internet |
| Answer» B. open software interconnection | |
| 40. |
    is used to create the organisation's overall security program. |
| A. | program policy |
| B. | purpose |
| C. | security |
| D. | none of these |
| Answer» B. purpose | |
| 41. |
                      means knowledge obtained from investigation, study , intelligence new ,facts . |
| A. | security |
| B. | data |
| C. | information |
| D. | none of these |
| Answer» D. none of these | |
| 42. |
Security Measures Needed to protect during their transmission |
| A. | file |
| B. | data |
| C. | packet |
| D. | all of above |
| Answer» C. packet | |