Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 25 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

1.

In brute force attack, on average half of all possible keys must be tried to achieve success.

A. True
B. False
C. none
D. all
Answer» B. False
2.

A computer ________ is a malicious code which self-replicates by copying itself to other programs.

A. Program
B. Virus
C. Application
D. Worm
Answer» C. Application
3.

_______________ infects the master boot record and it is challenging and a complex task to remove this virus.

A. Boot Sector Virus
B. Polymorphi
C. C Multipartite
D. Troj
Answer» B. Polymorphi
4.

Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.

A. Virus, Cyber-Criminals
B. Malware, Penetration Testers
C. Trojans, Cyber-Criminals
D. Virus, Penetration Testers
Answer» D. Virus, Penetration Testers
5.

During a DOS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted.

A. Network
B. System
C. Website
D. Router
Answer» D. Router
6.

The intent of a __________ is to overkill the targeted server s bandwidth and other resources of the target website.

A. Phishing attack
B. DoS attack
C. Website attack
D. MiTM attack
Answer» C. Website attack
7.

1. When one participant in a communication pretends to be someone else, it is called _________?

A. Virus Attacks
B. Fire Attacks
C. Data Driven Attacks
D. Masquerade
Answer» E.
8.

In ________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.

A. URL Redirection
B. DOS
C. Phishing
D. MiTM attack
Answer» D. MiTM attack
9.

For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 and find the cipher text.

A. C=23
B. C=56
C. C=92
D. C=80
Answer» E.
10.

Perform encryption on the following PT using RSA and find the CT. p = 11; q = 13; M = 7.

A. 78
B. 45
C. 124
D. 25
Answer» D. 25
11.

Perform encryption on the following PT using RSA and find the CT. p = 17; q = 31; M = 2.

A. 128
B. 124
C. 127
D. 167
Answer» B. 124
12.

Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES algorithm?

A. Rijndael
B. RC6
C. Blowfish
D. MARS
Answer» E.
13.

In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________.

A. Addition of ones
B. Addition of zeros
C. Duplication of the existing bits
D. Scaling of the existing bits
Answer» E.
14.

The number of unique substitution boxes in DES after the 48 bit XOR operation are___.

A. 4
B. 8
C. 12
D. 16
Answer» C. 12
15.

In an RSA system the public key of a given user is e = 31, n = 3599. What is the private key of this user?

A. 1023
B. 2432
C. 2412
D. 3031
Answer» E.
16.

For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Cipher message=11 and thus find the plain text.

A. 122
B. 143
C. 111
D. 88
Answer» E.
17.

For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.

A. 64
B. 11
C. 54
D. 23
Answer» C. 54
18.

Conventional cryptography is also known as _____________ or symmetric-key encryption.

A. Secret-key
B. Public key
C. Protected key
D. Primary key
Answer» B. Public key
19.

______________ employs a text string as a key that is implemented to do a series of shifts on the plain-text.

A. Shift Cipher
B. Block Cipher
C. Playfair Cipher
D. Vigenere Cipher
Answer» E.
20.

The ________________ has piece of the keyword that has the same length as that of the plaintext.

A. One-time pad
B. Hash functions
C. Vigenere Cipher
D. Block Cipher
Answer» B. Hash functions
21.

_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

A. Malware Analysis
B. Exploit writing
C. Reverse engineering
D. Cryptography
Answer» E.
22.

Data which is easily readable & understandable without any special algorithm or method is called _________________.

A. Cipher-text
B. Plain text
C. Raw text
D. Encrypted text
Answer» C. Raw text
23.

A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.

A. Security officer
B. Malicious hacker
C. Security auditor
D. Network analyst
Answer» C. Security auditor
24.

For the AES-128 algorithm there are __________ similar rounds and _________ round is different.

A. 9 ; the last
B. 8 ; the first and last
C. 10 ; no
D. 2 pair of 5 similar rounds ; every alternate
Answer» B. 8 ; the first and last
25.

Asymmetric key cryptography is used for all of the following except_______.

A. Encryption of data
B. Access control
C. Nonrepudiation
D. Steganography
Answer» E.