MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
means when an attacker pretends to be authentic user |
| A. | masquerade |
| B. | replay |
| C. | modification |
| D. | traffic analysis |
| Answer» B. replay | |
| 52. |
attack is when original data is modified and malicious data is inserted |
| A. | masquerade |
| B. | replay(rewrite) |
| C. | modification |
| D. | traffic analysis |
| Answer» C. modification | |
| 53. |
Release of Message Content and Traffic analysis are type of : |
| A. | both active and passive attacks |
| B. | neither active and passive attacks |
| C. | active attacks |
| D. | passive attacks |
| Answer» E. | |
| 54. |
3) Categories of Security Service |
| A. | 1 |
| B. | 1 &3 |
| C. | 2& 3 |
| D. | 1,2,3 |
| Answer» E. | |
| 55. |
Which of the following attack can actively modify communications or data? |
| A. | both active and passive attacks |
| B. | neither active and passive attacks |
| C. | active attacks |
| D. | passive attacks |
| Answer» D. passive attacks | |
| 56. |
What defines the restrictions on employees such as usage? |
| A. | regulatory |
| B. | advisory |
| C. | availability |
| D. | user policies |
| Answer» E. | |
| 57. |
Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior |
| A. | regulatory |
| B. | advisory |
| C. | availability |
| D. | user policies |
| Answer» C. availability | |
| 58. |
Which of the following are not security policies? |
| A. | regulatory |
| B. | advisory |
| C. | availability |
| D. | user policies |
| Answer» D. user policies | |
| 59. |
Policy ensures that the organization is maintaining standards set by specific industry regulation. |
| A. | regulatory |
| B. | advisory |
| C. | availability |
| D. | user policies |
| Answer» B. advisory | |
| 60. |
Examples of User Policies is/are: |
| A. | password policies |
| B. | internet usage |
| C. | system use |
| D. | all of the above |
| Answer» E. | |
| 61. |
is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction. |
| A. | network security |
| B. | database security |
| C. | information security |
| D. | physical security |
| Answer» D. physical security | |
| 62. |
When integrity is lacking in a security system, occurs. |
| A. | database hacking |
| B. | data deletion |
| C. | data tampering |
| D. | data leakage |
| Answer» D. data leakage | |
| 63. |
of information means, only authorised users are capable of accessing the information. |
| A. | confidentiality |
| B. | integrity |
| C. | non-repudiation |
| D. | availability |
| Answer» B. integrity | |
| 64. |
means the protection of data from modification by unknown users. |
| A. | confidentiality |
| B. | integrity |
| C. | authentication |
| D. | non-repudiation |
| Answer» C. authentication | |
| 65. |
SSL provides . |
| A. | message integrity |
| B. | confidentiality |
| C. | compression |
| D. | all of the above |
| Answer» E. | |
| 66. |
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS basedconnection. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 67. |
is used for encrypting data at network level |
| A. | ipsec |
| B. | https |
| C. | smtp |
| D. | s/mime |
| Answer» B. https | |
| 68. |
SSL primarily focuses on Pretty good privacy (PGP) is used in |
| A. | integrity and authenticity |
| B. | integrity and non-repudiation |
| C. | authenticity and privacy |
| D. | confidentiality andintegrity |
| Answer» B. integrity and non-repudiation | |
| 69. |
In tunnel mode, IPSec protects the |
| A. | entire ip packet |
| B. | ip header |
| C. | ip payload |
| D. | ip trailer |
| Answer» B. ip header | |
| 70. |
HTTPS is abbreviated as |
| A. | secured hyper hypertexts transfer text transfer protocol secured protocol |
| B. | none of the mentioned |
| C. | hyperlinked text transfer protocol secured |
| D. | hyper text transfer protocol secure |
| Answer» E. | |
| 71. |
IPSec is designed to provide security at the |
| A. | transport layer |
| B. | network layer |
| C. | application layer |
| D. | session layer |
| Answer» C. application layer | |
| 72. |
RSA algorithm is best example of |
| A. | asymmetric keycryptography |
| B. | symmetric keycryptography |
| C. | elliptic curve cryptography |
| D. | all of the above |
| Answer» B. symmetric keycryptography | |
| 73. |
Hash function is used for |
| A. | message authentication |
| B. | digital signature |
| C. | both a and b |
| D. | only a |
| Answer» D. only a | |
| 74. |
Diffie-Hellman algorithm is widely known as |
| A. | key exchange algorithm |
| B. | key agreementalgorithm |
| C. | only a |
| D. | both a and b |
| Answer» E. | |
| 75. |
Public key cryptography also called as |
| A. | asymmetric keycryptography |
| B. | symmetric keycryptography |
| C. | both a and b |
| D. | none of the above |
| Answer» B. symmetric keycryptography | |
| 76. |
In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n). |
| A. | true |
| B. | false |
| Answer» C. | |
| 77. |
In RSA, Ф(n) = in terms of p and q. |
| A. | (p)/(q) |
| B. | (p)(q) |
| C. | (p-1)(q-1) |
| D. | (p+1)(q+1) |
| Answer» D. (p+1)(q+1) | |
| 78. |
The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two partiesare not |
| A. | authenticated |
| B. | joined |
| C. | submit |
| D. | separate |
| Answer» B. joined | |
| 79. |
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages,it is very slow if the message is |
| A. | short |
| B. | flat |
| C. | long |
| D. | thin |
| Answer» D. thin | |
| 80. |
is the practice of concealing a message within another message,image or file. |
| A. | steganography |
| B. | cryptography |
| C. | cipher |
| D. | receiver |
| Answer» B. cryptography | |
| 81. |
The is a polygraphic substitution cipher based on linear algebra. |
| A. | hill cipher |
| B. | playfair cipher |
| C. | affine cipher |
| D. | none of these |
| Answer» B. playfair cipher | |
| 82. |
Conversion of plain text into Cipher text is called as . |
| A. | encryption |
| B. | decryption |
| C. | hidden text |
| D. | none of above |
| Answer» B. decryption | |
| 83. |
The full form of OSI is OSI model . |
| A. | open systemsinterconnection |
| B. | open softwareinterconnection |
| C. | open connection |
| D. | open system internet |
| Answer» B. open softwareinterconnection | |
| 84. |
The model is 7 layer architecture where each layer is having some specific functionality to perform. |
| A. | tcp |
| B. | osi |
| C. | ois |
| D. | none of these |
| Answer» C. ois | |
| 85. |
is used to create the organisation's overall security program. |
| A. | program policy |
| B. | purpose |
| C. | security |
| D. | none of these |
| Answer» B. purpose | |
| 86. |
means knowledge obtained from investigation, study , intelligence new ,facts . |
| A. | security |
| B. | data |
| C. | information |
| D. | none of these |
| Answer» D. none of these | |
| 87. |
Security Measures Needed to protect during their transmission |
| A. | file |
| B. | data |
| C. | packet |
| D. | all of above |
| Answer» C. packet | |
| 88. |
A digital signature needs a |
| A. | private-key system |
| B. | shared-key system |
| C. | public-key system |
| D. | all of them |
| Answer» D. all of them | |
| 89. |
What is necessary for a cross-site script attack with cookies to be thwarted |
| A. | captchas |
| B. | virtual machines |
| C. | proxies |
| D. | firewalls |
| Answer» B. virtual machines | |
| 90. |
In the course of conducting forensic analysis, which of the following actions are carried out? |
| A. | critical thinking |
| B. | fusion |
| C. | validation |
| D. | all of the above |
| Answer» E. | |
| 91. |
Given the scope and consequences of violent crimes, it is advisable to seek out and preserve all available digital evidence. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 92. |
Computers and mobile devices are treated as _________ crime scenes in violent crime investigations. |
| A. | temporary |
| B. | immediate |
| C. | remote |
| D. | secondary |
| Answer» E. | |
| 93. |
When reconstructing evidence surrounding a violent crime, it is generally helpful to: |
| A. | lay out all the evidence so it can be viewed in its entirety |
| B. | work with the crime scene technicians so that a better understanding of the crime is achieved |
| C. | construct a timeline of events from digital evidence |
| D. | begin the process of converting field notes to a final report |
| Answer» D. begin the process of converting field notes to a final report | |
| 94. |
Of particular significance in the scientific method is the weight attached to finding evidence which supports a particular hypothesis |
| A. | true |
| B. | false |
| Answer» B. false | |
| 95. |
When you have developed a theory, what can you do to confirm that your hypothesis is correct? |
| A. | predict, based on your hypothesis, where artifacts should be located |
| B. | perform experiments to test results and rule out alternate explanations |
| C. | conclude, based on your findings, whether the evidence supports the hypothesis |
| D. | all of the above |
| Answer» E. | |
| 96. |
The _____________ documentation specifies who handled the evidence, when, where, and for what purpose. |
| A. | evidence inventory |
| B. | . chain of custody |
| C. | evidence intake |
| D. | preservation notes |
| Answer» C. evidence intake | |
| 97. |
That part of cyberstalking where the offender is using the Internet to find a victim is known as: |
| A. | profiling |
| B. | trolling |
| C. | surreptitious monitoring |
| D. | none of the above. |
| Answer» D. none of the above. | |
| 98. |
When a cyberstalking case is stalled, it is a good idea to interview the victim again, because: |
| A. | the victim might have been withholding information during the first interview. |
| B. | the information that investigators have gathered might help the victim recall additional details. |
| C. | the time between the first and second interviews has given the victim time to seek counseling. |
| D. | none of the above |
| Answer» C. the time between the first and second interviews has given the victim time to seek counseling. | |
| 99. |
______uses the idea of certificate trust levels |
| A. | x509 |
| B. | pgp |
| C. | kdc |
| D. | none of them |
| Answer» C. kdc | |
| 100. |
An implication from studies indicating that many stalkers had prior acquaintance with their victims is that: |
| A. | part of the blame can be assigned to the victim. |
| B. | the offender is likely to be found in the same area as the victim |
| C. | investigators should pay particular attention to acquaintances of the victim |
| D. | investigators should always check the immediate family |
| Answer» D. investigators should always check the immediate family | |