

MCQOPTIONS
Saved Bookmarks
This section includes 25 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
1. |
In brute force attack, on average half of all possible keys must be tried to achieve success. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» B. False | |
2. |
A computer ________ is a malicious code which self-replicates by copying itself to other programs. |
A. | Program |
B. | Virus |
C. | Application |
D. | Worm |
Answer» C. Application | |
3. |
_______________ infects the master boot record and it is challenging and a complex task to remove this virus. |
A. | Boot Sector Virus |
B. | Polymorphi |
C. | C Multipartite |
D. | Troj |
Answer» B. Polymorphi | |
4. |
Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system. |
A. | Virus, Cyber-Criminals |
B. | Malware, Penetration Testers |
C. | Trojans, Cyber-Criminals |
D. | Virus, Penetration Testers |
Answer» D. Virus, Penetration Testers | |
5. |
During a DOS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted. |
A. | Network |
B. | System |
C. | Website |
D. | Router |
Answer» D. Router | |
6. |
The intent of a __________ is to overkill the targeted server s bandwidth and other resources of the target website. |
A. | Phishing attack |
B. | DoS attack |
C. | Website attack |
D. | MiTM attack |
Answer» C. Website attack | |
7. |
1. When one participant in a communication pretends to be someone else, it is called _________? |
A. | Virus Attacks |
B. | Fire Attacks |
C. | Data Driven Attacks |
D. | Masquerade |
Answer» E. | |
8. |
In ________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware. |
A. | URL Redirection |
B. | DOS |
C. | Phishing |
D. | MiTM attack |
Answer» D. MiTM attack | |
9. |
For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 and find the cipher text. |
A. | C=23 |
B. | C=56 |
C. | C=92 |
D. | C=80 |
Answer» E. | |
10. |
Perform encryption on the following PT using RSA and find the CT. p = 11; q = 13; M = 7. |
A. | 78 |
B. | 45 |
C. | 124 |
D. | 25 |
Answer» D. 25 | |
11. |
Perform encryption on the following PT using RSA and find the CT. p = 17; q = 31; M = 2. |
A. | 128 |
B. | 124 |
C. | 127 |
D. | 167 |
Answer» B. 124 | |
12. |
Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES algorithm? |
A. | Rijndael |
B. | RC6 |
C. | Blowfish |
D. | MARS |
Answer» E. | |
13. |
In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________. |
A. | Addition of ones |
B. | Addition of zeros |
C. | Duplication of the existing bits |
D. | Scaling of the existing bits |
Answer» E. | |
14. |
The number of unique substitution boxes in DES after the 48 bit XOR operation are___. |
A. | 4 |
B. | 8 |
C. | 12 |
D. | 16 |
Answer» C. 12 | |
15. |
In an RSA system the public key of a given user is e = 31, n = 3599. What is the private key of this user? |
A. | 1023 |
B. | 2432 |
C. | 2412 |
D. | 3031 |
Answer» E. | |
16. |
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Cipher message=11 and thus find the plain text. |
A. | 122 |
B. | 143 |
C. | 111 |
D. | 88 |
Answer» E. | |
17. |
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT. |
A. | 64 |
B. | 11 |
C. | 54 |
D. | 23 |
Answer» C. 54 | |
18. |
Conventional cryptography is also known as _____________ or symmetric-key encryption. |
A. | Secret-key |
B. | Public key |
C. | Protected key |
D. | Primary key |
Answer» B. Public key | |
19. |
______________ employs a text string as a key that is implemented to do a series of shifts on the plain-text. |
A. | Shift Cipher |
B. | Block Cipher |
C. | Playfair Cipher |
D. | Vigenere Cipher |
Answer» E. | |
20. |
The ________________ has piece of the keyword that has the same length as that of the plaintext. |
A. | One-time pad |
B. | Hash functions |
C. | Vigenere Cipher |
D. | Block Cipher |
Answer» B. Hash functions | |
21. |
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. |
A. | Malware Analysis |
B. | Exploit writing |
C. | Reverse engineering |
D. | Cryptography |
Answer» E. | |
22. |
Data which is easily readable & understandable without any special algorithm or method is called _________________. |
A. | Cipher-text |
B. | Plain text |
C. | Raw text |
D. | Encrypted text |
Answer» C. Raw text | |
23. |
A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase. |
A. | Security officer |
B. | Malicious hacker |
C. | Security auditor |
D. | Network analyst |
Answer» C. Security auditor | |
24. |
For the AES-128 algorithm there are __________ similar rounds and _________ round is different. |
A. | 9 ; the last |
B. | 8 ; the first and last |
C. | 10 ; no |
D. | 2 pair of 5 similar rounds ; every alternate |
Answer» B. 8 ; the first and last | |
25. |
Asymmetric key cryptography is used for all of the following except_______. |
A. | Encryption of data |
B. | Access control |
C. | Nonrepudiation |
D. | Steganography |
Answer» E. | |