MCQOPTIONS
Saved Bookmarks
This section includes 25 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
In brute force attack, on average half of all possible keys must be tried to achieve success. |
| A. | True |
| B. | False |
| C. | none |
| D. | all |
| Answer» B. False | |
| 2. |
A computer ________ is a malicious code which self-replicates by copying itself to other programs. |
| A. | Program |
| B. | Virus |
| C. | Application |
| D. | Worm |
| Answer» C. Application | |
| 3. |
_______________ infects the master boot record and it is challenging and a complex task to remove this virus. |
| A. | Boot Sector Virus |
| B. | Polymorphi |
| C. | C Multipartite |
| D. | Troj |
| Answer» B. Polymorphi | |
| 4. |
Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system. |
| A. | Virus, Cyber-Criminals |
| B. | Malware, Penetration Testers |
| C. | Trojans, Cyber-Criminals |
| D. | Virus, Penetration Testers |
| Answer» D. Virus, Penetration Testers | |
| 5. |
During a DOS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted. |
| A. | Network |
| B. | System |
| C. | Website |
| D. | Router |
| Answer» D. Router | |
| 6. |
The intent of a __________ is to overkill the targeted server s bandwidth and other resources of the target website. |
| A. | Phishing attack |
| B. | DoS attack |
| C. | Website attack |
| D. | MiTM attack |
| Answer» C. Website attack | |
| 7. |
1. When one participant in a communication pretends to be someone else, it is called _________? |
| A. | Virus Attacks |
| B. | Fire Attacks |
| C. | Data Driven Attacks |
| D. | Masquerade |
| Answer» E. | |
| 8. |
In ________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware. |
| A. | URL Redirection |
| B. | DOS |
| C. | Phishing |
| D. | MiTM attack |
| Answer» D. MiTM attack | |
| 9. |
For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 and find the cipher text. |
| A. | C=23 |
| B. | C=56 |
| C. | C=92 |
| D. | C=80 |
| Answer» E. | |
| 10. |
Perform encryption on the following PT using RSA and find the CT. p = 11; q = 13; M = 7. |
| A. | 78 |
| B. | 45 |
| C. | 124 |
| D. | 25 |
| Answer» D. 25 | |
| 11. |
Perform encryption on the following PT using RSA and find the CT. p = 17; q = 31; M = 2. |
| A. | 128 |
| B. | 124 |
| C. | 127 |
| D. | 167 |
| Answer» B. 124 | |
| 12. |
Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES algorithm? |
| A. | Rijndael |
| B. | RC6 |
| C. | Blowfish |
| D. | MARS |
| Answer» E. | |
| 13. |
In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________. |
| A. | Addition of ones |
| B. | Addition of zeros |
| C. | Duplication of the existing bits |
| D. | Scaling of the existing bits |
| Answer» E. | |
| 14. |
The number of unique substitution boxes in DES after the 48 bit XOR operation are___. |
| A. | 4 |
| B. | 8 |
| C. | 12 |
| D. | 16 |
| Answer» C. 12 | |
| 15. |
In an RSA system the public key of a given user is e = 31, n = 3599. What is the private key of this user? |
| A. | 1023 |
| B. | 2432 |
| C. | 2412 |
| D. | 3031 |
| Answer» E. | |
| 16. |
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Cipher message=11 and thus find the plain text. |
| A. | 122 |
| B. | 143 |
| C. | 111 |
| D. | 88 |
| Answer» E. | |
| 17. |
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT. |
| A. | 64 |
| B. | 11 |
| C. | 54 |
| D. | 23 |
| Answer» C. 54 | |
| 18. |
Conventional cryptography is also known as _____________ or symmetric-key encryption. |
| A. | Secret-key |
| B. | Public key |
| C. | Protected key |
| D. | Primary key |
| Answer» B. Public key | |
| 19. |
______________ employs a text string as a key that is implemented to do a series of shifts on the plain-text. |
| A. | Shift Cipher |
| B. | Block Cipher |
| C. | Playfair Cipher |
| D. | Vigenere Cipher |
| Answer» E. | |
| 20. |
The ________________ has piece of the keyword that has the same length as that of the plaintext. |
| A. | One-time pad |
| B. | Hash functions |
| C. | Vigenere Cipher |
| D. | Block Cipher |
| Answer» B. Hash functions | |
| 21. |
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. |
| A. | Malware Analysis |
| B. | Exploit writing |
| C. | Reverse engineering |
| D. | Cryptography |
| Answer» E. | |
| 22. |
Data which is easily readable & understandable without any special algorithm or method is called _________________. |
| A. | Cipher-text |
| B. | Plain text |
| C. | Raw text |
| D. | Encrypted text |
| Answer» C. Raw text | |
| 23. |
A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase. |
| A. | Security officer |
| B. | Malicious hacker |
| C. | Security auditor |
| D. | Network analyst |
| Answer» C. Security auditor | |
| 24. |
For the AES-128 algorithm there are __________ similar rounds and _________ round is different. |
| A. | 9 ; the last |
| B. | 8 ; the first and last |
| C. | 10 ; no |
| D. | 2 pair of 5 similar rounds ; every alternate |
| Answer» B. 8 ; the first and last | |
| 25. |
Asymmetric key cryptography is used for all of the following except_______. |
| A. | Encryption of data |
| B. | Access control |
| C. | Nonrepudiation |
| D. | Steganography |
| Answer» E. | |