Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

201.

Data compression includes

A. removal of redundant character
B. uniform distribution of characters
C. removal of redundant character & uniform distribution of characters
D. none of the mentioned
Answer» D. none of the mentioned
202.

Pretty good privacy (PGP) security system uses

A. public key cryptosystem
B. private key cryptosystem
C. public & private key cryptosystem
D. none of the mentioned
Answer» D. none of the mentioned
203.

In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.

A. select, alarm
B. alert, alarm
C. warning, alarm
D. warning, fatal
Answer» E.
204.

Which protocol is used for the purpose of copying the pending state into the current state?

A. alert protocol
B. handshake protocol
C. upper-layer protocol
D. change cipher spec protocol
Answer» E.
205.

Which protocol consists of only 1 bit?

A. alert protocol
B. handshake protocol
C. upper-layer protocol
D. change cipher spec protocol
Answer» E.
206.

Which protocol is used to convey SSL related alerts to the peer entity?

A. alert protocol
B. handshake protocol
C. upper-layer protocol
D. change cipher spec protocol
Answer» B. handshake protocol
207.

The full form of SSL is

A. serial session layer
B. secure socket layer
C. session secure layer
D. series socket layer
Answer» C. session secure layer
208.

Which one of the following is not a higher –layer SSL protocol?

A. alert protocol
B. handshake protocol
C. alarm protocol
D. change cipher spec protocol
Answer» D. change cipher spec protocol
209.

In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes.

A. 216
B. 232
C. 214
D. 212
Answer» D. 212
210.

In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.

A. true
B. false
Answer» C.
211.

In the above figure, which of the above shaded block is transparent to end users and applications?

A. ip/ipsec
B. ssl
C. kerberos
D. s/mime
Answer» B. ssl
212.

In the above figure from left to right, the correct order of the shaded levels are

A. network level, application level, transport level
B. application level, network level, transport level
C. transport level, application level, network level
D. network level, transport level, application level
Answer» E.
213.

ElGamal encryption system is __________

A. symmetric key encryption algorithm
B. asymmetric key encryption algorithm
C. not an encryption algorithm
D. block cipher method
Answer» C. not an encryption algorithm
214.

Voice privacy in GSM cellular telephone protocol is provided by _______

A. a5/2 cipher
B. b5/4 cipher
C. b5/6 cipher
D. b5/8 cipher
Answer» B. b5/4 cipher
215.

Which one of the following is a cryptographic protocol used to secure HTTP connection?

A. stream control transmission protocol (sctp)
B. transport layer security (tls)
C. explicit congestion notification (ecn)
D. resource reservation protocol
Answer» C. explicit congestion notification (ecn)
216.

Cryptographic hash function takes an arbitrary block of data and returns _________

A. fixed size bit string
B. variable size bit string
C. both fixed size bit string and variable size bit string
D. variable sized byte string
Answer» B. variable size bit string
217.

Cryptanalysis is used __________

A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. to make new ciphers
Answer» B. to increase the speed
218.

Conventional cryptography is also known as or symmetric-key encryption.

A. secret-key
B. public key
C. protected key
D. primary key
Answer» B. public key
219.

Cryptanalysis is used

A. to find some insecurity in a cryptographic scheme
B. to increase the speed
C. to encrypt the data
D. to make new ciphers
Answer» B. to increase the speed
220.

The procedure to add bits to the last block is termed as

A. decryption
B. hashing
C. tuning
D. padding
Answer» E.
221.

                                           is the art & science of cracking the cipher-text without knowing the key.

A. cracking
B. cryptanalysis
C. cryptography
D. crypto-hacking
Answer» C. cryptography
222.

In same keys are implemented for encrypting as well as decrypting the information.

A. symmetric key encryption
B. asymmetric key encryption
C. asymmetric key decryption
D. hash-based key encryption
Answer» B. asymmetric key encryption
223.

An attack in which the user receives unwanted amount of e- mails.

A. smurfing
B. denial of service
C. e-mail bombing
D. ping storm
Answer» D. ping storm
224.

Study of creating a d using encryption and decryption techniques.

A. cipher
B. cryptography
C. encryption
D. decryption
Answer» C. encryption
225.

A unique piece of information that is used in encryption.

A. cipher
B. plain text
C. key
D. cipher
Answer» D. cipher
226.

The information that gets transformed in encryption is

A. plain text
B. parallel text
C. encrypted text
D. decrypted text
Answer» B. parallel text
227.

If communication between 2 people is overheard by a third person without extraction of any data, it is called as:

A. release of message content-passive attack
B. traffic analysis -passive attacks
C. release of message content- active attacks
D. traffic analysis -active attacks
Answer» E.
228.

If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:

A. release of message content-passive attack
B. traffic analysis -passive attacks
C. release of message content- active attacks
D. traffic analysis -active attacks
Answer» B. traffic analysis -passive attacks
229.

In layer, vulnerabilities are directly associated with physical access to networks and hardware.

A. physical
B. data-link
C. network
D. application
Answer» B. data-link
230.

The full form of OSI is OSI model is

A. open systems interconnection
B. open software interconnection
C. open systems internet
D. open software internet
Answer» B. open software interconnection
231.

Compromising confidential information comes under

A. bug
B. threat
C. vulnerability
D. attack
Answer» C. vulnerability
232.

From the options below, which of them is not a threat to information security?

A. disaster
B. eavesdropping
C. information leakage
D. unchanged default password
Answer» E.
233.

               is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

A. network security
B. database security
C. information security
D. physical security
Answer» D. physical security
234.

Data integrity gets compromised when and are taken control off.

A. access control, file deletion
B. network, file permission
C. access control, file permission
D. network, system
Answer» D. network, system
235.

This helps in identifying the origin of information and authentic user. This referred to here as

A. confidentiality
B. integrity
C. authenticity
D. availability
Answer» D. availability
236.

Data is used to ensure confidentiality.

A. encryption
B. locking
C. deleting
D. backup
Answer» B. locking
237.

Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

A. they help understanding hacking better
B. they are key elements to a security breach
C. they help understands security and its components better
D. they help to understand the cyber-crime better
Answer» D. they help to understand the cyber-crime better
238.

When integrity is lacking in a security system,                     occurs.

A. database hacking
B. data deletion
C. data tampering
D. data leakage
Answer» D. data leakage
239.

When you use the word it means you are protecting your data from getting disclosed.

A. confidentiality
B. integrity
C. authentication
D. availability
Answer» B. integrity
240.

               of information means, only authorised users are capable of accessing the information.

A. confidentiality
B. integrity
C. non-repudiation
D. availability
Answer» B. integrity
241.

             means the protection of data from modification by unknown users.

A. confidentiality
B. integrity
C. authentication
D. non-repudiation
Answer» C. authentication
242.

CIA triad is also known as

A. nic (non-repudiation, integrity, confidentiality)
B. aic (availability, integrity, confidentiality)
C. ain (availability, integrity, non-repudiation)
D. aic (authenticity, integrity, confidentiality)
Answer» C. ain (availability, integrity, non-repudiation)
243.

length of the IPv6 header is....

A. 64 bits
B. 16 bits
C. 32 bits
D. 8 bits
Answer» D. 8 bits
244.

IPSec provides ....protocols for network layer

A. 7
B. 3
C. 1
D. 4
Answer» B. 3
245.

length of the IPv6 acddress is ....

A. 32 bits
B. 64 bits
C. 16 bits
D. 128 bit
Answer» C. 16 bits
246.

Transport layer Protocol consists of ... main components

A. 2
B. 1
C. 3
D. 4
Answer» B. 1
247.

SET stands for

A. set electronic transaction
B. secure electronic transaction
C. simple electronic transaction
D. none of the above
Answer» C. simple electronic transaction
248.

PGP is abbreviated as

A. pretty good privacy
B. pretty good policy
C. policy good privacy
D. pretty good protection
Answer» B. pretty good policy
249.

Internet Key Exchange has .... phases and modes of operations

A. 4
B. 3
C. 2
D. 5
Answer» D. 5
250.

IPSec operates in..... different modes

A. 3
B. 2
C. 4
D. 5
Answer» C. 4