Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

means when an attacker pretends to be authentic user

A. masquerade
B. replay
C. modification
D. traffic analysis
Answer» B. replay
2.

attack is when original data is modified and malicious data is inserted

A. masquerade
B. replay(rewrite)
C. modification
D. traffic analysis
Answer» C. modification
3.

Release of Message Content and Traffic analysis are type of :

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» E.
4.

3) Categories of Security Service

A. 1
B. 1 &3
C. 2& 3
D. 1,2,3
Answer» E.
5.

Which of the following attack can actively modify communications or data?

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» D. passive attacks
6.

What defines the restrictions on employees such as usage?

A. regulatory
B. advisory
C. availability
D. user policies
Answer» E.
7.

Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior

A. regulatory
B. advisory
C. availability
D. user policies
Answer» C. availability
8.

Which of the following are not security policies?

A. regulatory
B. advisory
C. availability
D. user policies
Answer» D. user policies
9.

Policy ensures that the organization is maintaining standards set by specific industry regulation.

A. regulatory
B. advisory
C. availability
D. user policies
Answer» B. advisory
10.

Examples of User Policies is/are:

A. password policies
B. internet usage
C. system use
D. all of the above
Answer» E.
11.

is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

A. network security
B. database security
C. information security
D. physical security
Answer» D. physical security
12.

When integrity is lacking in a security system,                     occurs.

A. database hacking
B. data deletion
C. data tampering
D. data leakage
Answer» D. data leakage
13.

of information means, only authorised users are capable of accessing the information.

A. confidentiality
B. integrity
C. non-repudiation
D. availability
Answer» B. integrity
14.

means the protection of data from modification by unknown users.

A. confidentiality
B. integrity
C. authentication
D. non-repudiation
Answer» C. authentication
15.

SSL provides .

A. message integrity
B. confidentiality
C. compression
D. all of the above
Answer» E.
16.

TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS basedconnection.

A. true
B. false
Answer» B. false
17.

is used for encrypting data at network level

A. ipsec
B. https
C. smtp
D. s/mime
Answer» B. https
18.

SSL primarily focuses on                  Pretty good privacy (PGP) is used in

A. integrity and authenticity
B. integrity and non-repudiation
C. authenticity and privacy
D. confidentiality andintegrity
Answer» B. integrity and non-repudiation
19.

In tunnel mode, IPSec protects the

A. entire ip packet
B. ip header
C. ip payload
D. ip trailer
Answer» B. ip header
20.

HTTPS is abbreviated as

A. secured hyper hypertexts transfer text transfer protocol secured protocol
B. none of the mentioned
C. hyperlinked text transfer protocol secured
D. hyper text transfer protocol secure
Answer» E.
21.

IPSec is designed to provide security at the

A. transport layer
B. network layer
C. application layer
D. session layer
Answer» C. application layer
22.

RSA algorithm is best example of

A. asymmetric keycryptography
B. symmetric keycryptography
C. elliptic curve cryptography
D. all of the above
Answer» B. symmetric keycryptography
23.

Hash function is used for

A. message authentication
B. digital signature
C. both a and b
D. only a
Answer» D. only a
24.

Diffie-Hellman algorithm is widely known as

A. key exchange algorithm
B. key agreementalgorithm
C. only a
D. both a and b
Answer» E.
25.

Public key cryptography also called as

A. asymmetric keycryptography
B. symmetric keycryptography
C. both a and b
D. none of the above
Answer» B. symmetric keycryptography
26.

In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).

A. true
B. false
Answer» C.
27.

In RSA, Ф(n) = in terms of p and q.

A. (p)/(q)
B. (p)(q)
C. (p-1)(q-1)
D. (p+1)(q+1)
Answer» D. (p+1)(q+1)
28.

The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two partiesare not

A. authenticated
B. joined
C. submit
D. separate
Answer» B. joined
29.

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages,it is very slow if the message is

A. short
B. flat
C. long
D. thin
Answer» D. thin
30.

is the practice of concealing a message within another message,image or file.

A. steganography
B. cryptography
C. cipher
D. receiver
Answer» B. cryptography
31.

The is a polygraphic substitution cipher based on linear algebra.

A. hill cipher
B. playfair cipher
C. affine cipher
D. none of these
Answer» B. playfair cipher
32.

Conversion of plain text into Cipher text is called as .

A. encryption
B. decryption
C. hidden text
D. none of above
Answer» B. decryption
33.

The full form of OSI is OSI model .

A. open systemsinterconnection
B. open softwareinterconnection
C. open connection
D. open system internet
Answer» B. open softwareinterconnection
34.

The model is 7 layer architecture where each layer is having some specific functionality to perform.

A. tcp
B. osi
C. ois
D. none of these
Answer» C. ois
35.

is used to create the organisation's overall security program.

A. program policy
B. purpose
C. security
D. none of these
Answer» B. purpose
36.

means knowledge obtained from investigation, study , intelligence new ,facts .

A. security
B. data
C. information
D. none of these
Answer» D. none of these
37.

Security Measures Needed to protect during their transmission

A. file
B. data
C. packet
D. all of above
Answer» C. packet
38.

A digital signature needs a

A. private-key system
B. shared-key system
C. public-key system
D. all of them
Answer» D. all of them
39.

What is necessary for a cross-site script attack with cookies to be thwarted

A. captchas
B. virtual machines
C. proxies
D. firewalls
Answer» B. virtual machines
40.

In the course of conducting forensic analysis, which of the following actions are carried out?

A. critical thinking
B. fusion
C. validation
D. all of the above
Answer» E.
41.

Given the scope and consequences of violent crimes, it is advisable to seek out and preserve all available digital evidence.

A. true
B. false
Answer» B. false
42.

Computers and mobile devices are treated as _________ crime scenes in violent crime investigations.

A. temporary
B. immediate
C. remote
D. secondary
Answer» E.
43.

When reconstructing evidence surrounding a violent crime, it is generally helpful to:

A. lay out all the evidence so it can be viewed in its entirety
B. work with the crime scene technicians so that a better understanding of the crime is achieved
C. construct a timeline of events from digital evidence
D. begin the process of converting field notes to a final report
Answer» D. begin the process of converting field notes to a final report
44.

Of particular significance in the scientific method is the weight attached to finding evidence which supports a particular hypothesis

A. true
B. false
Answer» B. false
45.

When you have developed a theory, what can you do to confirm that your hypothesis is correct?

A. predict, based on your hypothesis, where artifacts should be located
B. perform experiments to test results and rule out alternate explanations
C. conclude, based on your findings, whether the evidence supports the hypothesis
D. all of the above
Answer» E.
46.

The _____________ documentation specifies who handled the evidence, when, where, and for what purpose.

A. evidence inventory
B. . chain of custody
C. evidence intake
D. preservation notes
Answer» C. evidence intake
47.

That part of cyberstalking where the offender is using the Internet to find a victim is known as:

A. profiling
B. trolling
C. surreptitious monitoring
D. none of the above.
Answer» D. none of the above.
48.

When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:

A. the victim might have been withholding information during the first interview.
B. the information that investigators have gathered might help the victim recall additional details.
C. the time between the first and second interviews has given the victim time to seek counseling.
D. none of the above
Answer» C. the time between the first and second interviews has given the victim time to seek counseling.
49.

______uses the idea of certificate trust levels

A. x509
B. pgp
C. kdc
D. none of them
Answer» C. kdc
50.

An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:

A. part of the blame can be assigned to the victim.
B. the offender is likely to be found in the same area as the victim
C. investigators should pay particular attention to acquaintances of the victim
D. investigators should always check the immediate family
Answer» D. investigators should always check the immediate family