Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.

A. true
B. false
Answer» B. false
2.

length of the IPv4 address is ....

A. 32 bits
B. 64 bits
C. 16 bits
D. 128 bit
Answer» B. 64 bits
3.

Which of the following is not a strong security protocol

A. ssl
B. httpl
C. smtp
D. sftp
Answer» D. sftp
4.

WPA2 is used for security in _______

A. ethernet
B. wi-fi
C. bluetooth
D. e-mail
Answer» C. bluetooth
5.

__________ is used for encrypting data at network level

A. ipsec
B. https
C. smtp
D. s/mime
Answer» B. https
6.

SSL primarily focuses on _______

A. integrity and authenticity
B. integrity and non-repudiation
C. authenticity and privacy
D. confidentiality and integrity
Answer» B. integrity and non-repudiation
7.

An attempt to make a computer resource unavailable to its intended users is called ______

A. denial-of-service attack
B. virus attack
C. worms attack
D. botnet process
Answer» B. virus attack
8.

HTTPS is abbreviated as _________

A. hypertexts transfer protocol secured
B. secured hyper text transfer protocol
C. hyperlinked text transfer protocol secured
D. hyper text transfer protocol secure
Answer» E.
9.

RSA algorithm is best example of_______

A. asymmetric key cryptography
B. symmetric key cryptography
C. elliptic curve cryptography
D. all of the above
Answer» B. symmetric key cryptography
10.

Hash function is used for________

A. message authentication
B. digital signature
C. both a and b
D. only a
Answer» D. only a
11.

Diffie-Hellman algorithm is widely known as_________

A. key exchange algorithm
B. key agreement algorithm
C. only a
D. both a and b
Answer» E.
12.

Public key cryptography also called as________

A. asymmetric key cryptography
B. symmetric key cryptography
C. both a and b
D. none of the above
Answer» B. symmetric key cryptography
13.

USENET falls under which category of public key sharing?

A. public announcement
B. publicly available directory
C. public key authority
D. public key certificate
Answer» B. publicly available directory
14.

RSA is also a stream cipher like Merkel-Hellman.

A. true
B. false
Answer» B. false
15.

In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).

A. true
B. false
Answer» C.
16.

In RSA, Ф(n) = _______ in terms of p and q.

A.  (p)/(q)
B.  (p)(q)
C. (p-1)(q-1)
D.  (p+1)(q+1)
Answer» D.  (p+1)(q+1)
17.

For RSA to work, the value of P must be less than the value of

A. p
B. q
C. n
D. r
Answer» D. r
18.

In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

A. other
B. data
C. keys
D. each other
Answer» E.
19.

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

A. short
B. flat
C. long
D. thin
Answer» D. thin
20.

In cryptography the original message before being transform is called

A. simple text
B. plain text
C. empty text
D. filled text
Answer» C. empty text
21.

__is the practice of concealing a message within another message,image or file.

A. steganography
B. cryptography
C. cipher
D. receiver
Answer» B. cryptography
22.

The__is a polygraphic substitution cipher based on linear algebra.

A. hill cipher
B. playfair cipher
C. affine cipher
D. none of these
Answer» B. playfair cipher
23.

An asymmetric-key (or public-key) cipher uses

A. 1 key
B. 2 key
C. 3 key
D. 4 key
Answer» B. 2 key
24.

The message which is not understandable is called as?

A. cipher text
B. plain text
C. hidden text
D. both a & c
Answer» B. plain text
25.

In AES in which Round Subkeys are Generated from Original key for each round?

A. key expansion
B. initial round
C. finale round
D. none of these
Answer» B. initial round
26.

Which of them is type of Cipher?

A. stream cipher
B. block cipher
C. both of them
D. none of these
Answer» D. none of these
27.

AES stands for?

A. authorized encryption standard
B. advance encryption standard
C. advance encryption strategy
D. none of these
Answer» C. advance encryption strategy
28.

What is the 4th step in DES Algorithm?

A. key transformation
B. s-box substitution
C. p-box permutation
D. expansion permutation
Answer» D. expansion permutation
29.

In DES step both LPT and RPT undergoes in how much key Rounds?

A. 8
B. 16
C. 32
D. 64
Answer» C. 32
30.

Blum Blum Shub Generator is based on which Algorithm?

A. private key
B. public key
C. both a & b
D. none of these
Answer» C. both a & b
31.

In Symmetric schemes requires both parties to share how many secret key?

A. one
B. two
C. three
D. four
Answer» B. two
32.

The technique in which when one character is replaced by another Character is called as?

A. transposition
B. substitution
C. combinational
D. none of these
Answer» C. combinational
33.

Conversion of plain text into Cipher text is called as________.

A. encryption
B. decryption
C. hidden text
D. none of above
Answer» B. decryption
34.

The full form of OSI is OSI model__.

A. open systems interconnection
B. open software interconnection
C. open connection
D. open system internet
Answer» B. open software interconnection
35.

The__model is 7 layer architecture where each layer is having some specific functionality to perform.

A. tcp
B. osi
C. ois
D. none of these
Answer» C. ois
36.

__is used to create the organisation's overall security program.

A. program policy
B. purpose
C. security
D. none of these
Answer» B. purpose
37.

A way to ensure that the entity is indeed what it claims to be.-

A. authentication
B. accountability
C. identification
D. security
Answer» B. accountability
38.

Conversion of Cypher text to plain text?

A. encryption
B. decryption
C. simple text
D. none of these
Answer» C. simple text
39.

An act of protecting information from unauthorised disclouser to an entity.-

A. intergrity
B. avability
C. confidentiality
D. none of these
Answer» D. none of these
40.

Symmetric key encryption is also called as?

A. public key encryption
B. private key encryption
C. both of these
D. none of these
Answer» C. both of these
41.

A hacker guessing suggested password to a program is call as?

A. password guessing
B. dictionary attack
C. default password attack
D. none of these
Answer» D. none of these
42.

What is full form of DDoS?

A. derived denial of service
B. distributed denial of service
C. denial of service
D. none of these
Answer» C. denial of service
43.

Which One of them is Passive attack?

A. denial of service
B. modify message in transit
C. replay previous message
D. obtain message contain
Answer» E.
44.

What is lying of IP address called as?

A. ip spoofing
B. ip scamming
C. ip lying
D. none of theses
Answer» B. ip scamming
45.

Protection against Denial by one of these parties in a communication refers to?

A. non-repudiation
B. data integrity
C. authentication
D. none of these
Answer» B. data integrity
46.

Prevention of the unauthorised used of Resources refers too?

A. data integrity
B. data confidentiality
C. acess control
D. none of these
Answer» D. none of these
47.

__________ means knowledge obtained from investigation, study , intelligence new ,facts .

A. security
B. data
C. information
D. none of these
Answer» D. none of these
48.

Security Measures Needed to protect ________ during their transmission

A. file
B. data
C. packet
D. all of above
Answer» C. packet
49.

S/MIME is abbreviated as __________________

A. secure/multimedia internet mailing extensions
B. secure/multipurpose internet mailing extensions
C. secure/multimedia internet mail extensions
D. secure/multipurpose internet mail extensions
Answer» E.
50.

In SSL, what is used for authenticating a message?

A. mac (message access code)
B. mac (message authentication code)
C. mac (machine authentication code)
D. mac (machine access code)
Answer» C. mac (machine authentication code)