Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

In asymmetric key cryptography, the private key is kept by __________

A. sender
B. receiver
C. sender and receiver
D. all the connected devices to the network
Answer» C. sender and receiver
2.

What is data encryption standard (DES)?

A. block cipher
B. stream cipher
C. bit cipher
D. byte cipher
Answer» B. stream cipher
3.

In cryptography, the order of the letters in a message is rearranged by __________

A. transpositional ciphers
B. substitution ciphers
C. both transpositional ciphers and substitution ciphers
D. quadratic ciphers
Answer» B. substitution ciphers
4.

In cryptography, what is cipher?

A. algorithm for performing encryption and decryption
B. encrypted message
C. both algorithm for performing encryption and decryption and encrypted message
D. decrypted message
Answer» B. encrypted message
5.

Which is the largest disadvantage of the symmetric Encryption?

A. more complex and therefore more time-consuming calculations.
B. problem of the secure transmission of the secret key.
C. less secure encryption function.
D. isn\t used any more.
Answer» C. less secure encryption function.
6.

Which of the following Algorithms not belong to symmetric encryption

A. 3des (tripledes)
B. rsa
C. rc5
D. idea
Answer» C. rc5
7.

What type of attack uses a fraudulent server with a relay address?

A. ntlm
B. mitm
C. netbios
D. smb
Answer» C. netbios
8.

The ________ is encrypted text.

A. a) cipher scricpt
B. b) cipher text
C. c) secret text
D. d) secret script
Answer» C. c) secret text
9.

Release of message contents and Traffic analysis are two types of _________ attacks.

A. a) active attack
B. b) modification of attack
C. c) passive attack
D. d) dos attack
Answer» D. d) dos attack
10.

A company requires its users to change passwords every month. This improves the ________ of the network.

A. a) performance
B. b) reliability
C. c) security
D. d) none of the above
Answer» D. d) none of the above
11.

What does OSI stand for in the OSI Security Architecure?

A. a) open system interface
B. b) open systems interconnections
C. c) open source initiative
D. d) open standard interconnections
Answer» C. c) open source initiative
12.

Data ___________ is used to ensure confidentiality.

A. a) encryption
B. b) locking
C. c) decryption
D. d) backup
Answer» B. b) locking
13.

This helps in identifying the origin of information and authentic user. This referred to here as __________

A. a) confidentiality
B. b) integrity
C. c) authenticity
D. d) availability
Answer» D. d) availability
14.

_______ of information means, only authorized users are capable of accessing the information.

A. a) confidentiality
B. b) integrity
C. c) non-repudiation
D. d) availability
Answer» E.
15.

When you use the word ______it means you are protecting your data from getting disclosed.

A. a) confidentiality
B. b) integrity
C. c) authentication
D. d) availability
Answer» B. b) integrity
16.

_______ means the protection of data from modification by unknown users.

A. a) confidentiality
B. b) integrity
C. c) authentication
D. d) non-repudiation
Answer» C. c) authentication
17.

Related to information security, confidentiality is the opposite of which of the following?

A. a) closure
B. b) disclosure
C. c) disaster
D. d) disposal
Answer» C. c) disaster
18.

The CIA triad is often represented by which of the following?

A. a) triangle
B. b) diagonal
C. c) ellipse
D. d) circle
Answer» B. b) diagonal
19.

An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

A. a) cyber-crime
B. b) cyber attack
C. c) system hijacking
D. d) digital crime
Answer» C. c) system hijacking
20.

_______ platforms are used for safety and protection of information in the cloud.

A. a) cloud workload protection platforms
B. b) cloud security protocols
C. c) aws
D. d) one drive
Answer» B. b) cloud security protocols
21.

_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.

A. a) network security
B. b) database security
C. c) information security
D. d) physical security
Answer» D. d) physical security
22.

Compromising confidential information comes under _________

A. a) bug
B. b) threat
C. c) vulnerability
D. d) attack
Answer» C. c) vulnerability
23.

What are the two primary classifications of cross-site scripting?

A. dom based and persistent
B. traditional and dom based
C. traditional and non-persistent
D. non-persistent and persistent
Answer» E.
24.

What is one advantage of setting up a DMZ with two firewalls?

A. you can control where traffic goes in three networks
B. you can do stateful packet filtering
C. you can do load balancing
D. ??improved network performance
Answer» D. ??improved network performance
25.

For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset.

A. ticket
B. local
C. token
D. user
Answer» B. local
26.

The basic Web Services platform is combination of _____ and _______

A. css + http
B. xml + html
C. xml + http
D. css + java
Answer» D. css + java
27.

For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keys”.

A. key
B. realm
C. document
D. none of the mentioned
Answer» C. document
28.

In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

A. transport
B. tunnel
C. either (a) or (b)
D. neither (a) nor (b)
Answer» C. either (a) or (b)
29.

The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

A. transport
B. tunnel
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. tunnel