MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 201. |
Data compression includes |
| A. | removal of redundant character |
| B. | uniform distribution of characters |
| C. | removal of redundant character & uniform distribution of characters |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 202. |
Pretty good privacy (PGP) security system uses |
| A. | public key cryptosystem |
| B. | private key cryptosystem |
| C. | public & private key cryptosystem |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 203. |
In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively. |
| A. | select, alarm |
| B. | alert, alarm |
| C. | warning, alarm |
| D. | warning, fatal |
| Answer» E. | |
| 204. |
Which protocol is used for the purpose of copying the pending state into the current state? |
| A. | alert protocol |
| B. | handshake protocol |
| C. | upper-layer protocol |
| D. | change cipher spec protocol |
| Answer» E. | |
| 205. |
Which protocol consists of only 1 bit? |
| A. | alert protocol |
| B. | handshake protocol |
| C. | upper-layer protocol |
| D. | change cipher spec protocol |
| Answer» E. | |
| 206. |
Which protocol is used to convey SSL related alerts to the peer entity? |
| A. | alert protocol |
| B. | handshake protocol |
| C. | upper-layer protocol |
| D. | change cipher spec protocol |
| Answer» B. handshake protocol | |
| 207. |
The full form of SSL is |
| A. | serial session layer |
| B. | secure socket layer |
| C. | session secure layer |
| D. | series socket layer |
| Answer» C. session secure layer | |
| 208. |
Which one of the following is not a higher –layer SSL protocol? |
| A. | alert protocol |
| B. | handshake protocol |
| C. | alarm protocol |
| D. | change cipher spec protocol |
| Answer» D. change cipher spec protocol | |
| 209. |
In the SSL Protocol, each upper layer message if fragmented into a maximum of __________ bytes. |
| A. | 216 |
| B. | 232 |
| C. | 214 |
| D. | 212 |
| Answer» D. 212 | |
| 210. |
In terms of Web Security Threats, “Impersonation of another user†is a Passive Attack. |
| A. | true |
| B. | false |
| Answer» C. | |
| 211. |
In the above figure, which of the above shaded block is transparent to end users and applications? |
| A. | ip/ipsec |
| B. | ssl |
| C. | kerberos |
| D. | s/mime |
| Answer» B. ssl | |
| 212. |
In the above figure from left to right, the correct order of the shaded levels are |
| A. | network level, application level, transport level |
| B. | application level, network level, transport level |
| C. | transport level, application level, network level |
| D. | network level, transport level, application level |
| Answer» E. | |
| 213. |
ElGamal encryption system is __________ |
| A. | symmetric key encryption algorithm |
| B. | asymmetric key encryption algorithm |
| C. | not an encryption algorithm |
| D. | block cipher method |
| Answer» C. not an encryption algorithm | |
| 214. |
Voice privacy in GSM cellular telephone protocol is provided by _______ |
| A. | a5/2 cipher |
| B. | b5/4 cipher |
| C. | b5/6 cipher |
| D. | b5/8 cipher |
| Answer» B. b5/4 cipher | |
| 215. |
Which one of the following is a cryptographic protocol used to secure HTTP connection? |
| A. | stream control transmission protocol (sctp) |
| B. | transport layer security (tls) |
| C. | explicit congestion notification (ecn) |
| D. | resource reservation protocol |
| Answer» C. explicit congestion notification (ecn) | |
| 216. |
Cryptographic hash function takes an arbitrary block of data and returns _________ |
| A. | fixed size bit string |
| B. | variable size bit string |
| C. | both fixed size bit string and variable size bit string |
| D. | variable sized byte string |
| Answer» B. variable size bit string | |
| 217. |
Cryptanalysis is used __________ |
| A. | to find some insecurity in a cryptographic scheme |
| B. | to increase the speed |
| C. | to encrypt the data |
| D. | to make new ciphers |
| Answer» B. to increase the speed | |
| 218. |
Conventional cryptography is also known as or symmetric-key encryption. |
| A. | secret-key |
| B. | public key |
| C. | protected key |
| D. | primary key |
| Answer» B. public key | |
| 219. |
Cryptanalysis is used |
| A. | to find some insecurity in a cryptographic scheme |
| B. | to increase the speed |
| C. | to encrypt the data |
| D. | to make new ciphers |
| Answer» B. to increase the speed | |
| 220. |
The procedure to add bits to the last block is termed as |
| A. | decryption |
| B. | hashing |
| C. | tuning |
| D. | padding |
| Answer» E. | |
| 221. |
                                           is the art & science of cracking the cipher-text without knowing the key. |
| A. | cracking |
| B. | cryptanalysis |
| C. | cryptography |
| D. | crypto-hacking |
| Answer» C. cryptography | |
| 222. |
In same keys are implemented for encrypting as well as decrypting the information. |
| A. | symmetric key encryption |
| B. | asymmetric key encryption |
| C. | asymmetric key decryption |
| D. | hash-based key encryption |
| Answer» B. asymmetric key encryption | |
| 223. |
An attack in which the user receives unwanted amount of e- mails. |
| A. | smurfing |
| B. | denial of service |
| C. | e-mail bombing |
| D. | ping storm |
| Answer» D. ping storm | |
| 224. |
Study of creating a d using encryption and decryption techniques. |
| A. | cipher |
| B. | cryptography |
| C. | encryption |
| D. | decryption |
| Answer» C. encryption | |
| 225. |
A unique piece of information that is used in encryption. |
| A. | cipher |
| B. | plain text |
| C. | key |
| D. | cipher |
| Answer» D. cipher | |
| 226. |
The information that gets transformed in encryption is |
| A. | plain text |
| B. | parallel text |
| C. | encrypted text |
| D. | decrypted text |
| Answer» B. parallel text | |
| 227. |
If communication between 2 people is overheard by a third person without extraction of any data, it is called as: |
| A. | release of message content-passive attack |
| B. | traffic analysis -passive attacks |
| C. | release of message content- active attacks |
| D. | traffic analysis -active attacks |
| Answer» E. | |
| 228. |
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as: |
| A. | release of message content-passive attack |
| B. | traffic analysis -passive attacks |
| C. | release of message content- active attacks |
| D. | traffic analysis -active attacks |
| Answer» B. traffic analysis -passive attacks | |
| 229. |
In layer, vulnerabilities are directly associated with physical access to networks and hardware. |
| A. | physical |
| B. | data-link |
| C. | network |
| D. | application |
| Answer» B. data-link | |
| 230. |
The full form of OSI is OSI model is |
| A. | open systems interconnection |
| B. | open software interconnection |
| C. | open systems internet |
| D. | open software internet |
| Answer» B. open software interconnection | |
| 231. |
Compromising confidential information comes under |
| A. | bug |
| B. | threat |
| C. | vulnerability |
| D. | attack |
| Answer» C. vulnerability | |
| 232. |
From the options below, which of them is not a threat to information security? |
| A. | disaster |
| B. | eavesdropping |
| C. | information leakage |
| D. | unchanged default password |
| Answer» E. | |
| 233. |
               is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction. |
| A. | network security |
| B. | database security |
| C. | information security |
| D. | physical security |
| Answer» D. physical security | |
| 234. |
Data integrity gets compromised when and are taken control off. |
| A. | access control, file deletion |
| B. | network, file permission |
| C. | access control, file permission |
| D. | network, system |
| Answer» D. network, system | |
| 235. |
This helps in identifying the origin of information and authentic user. This referred to here as |
| A. | confidentiality |
| B. | integrity |
| C. | authenticity |
| D. | availability |
| Answer» D. availability | |
| 236. |
Data is used to ensure confidentiality. |
| A. | encryption |
| B. | locking |
| C. | deleting |
| D. | backup |
| Answer» B. locking | |
| 237. |
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental? |
| A. | they help understanding hacking better |
| B. | they are key elements to a security breach |
| C. | they help understands security and its components better |
| D. | they help to understand the cyber-crime better |
| Answer» D. they help to understand the cyber-crime better | |
| 238. |
When integrity is lacking in a security system, Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â occurs. |
| A. | database hacking |
| B. | data deletion |
| C. | data tampering |
| D. | data leakage |
| Answer» D. data leakage | |
| 239. |
When you use the word it means you are protecting your data from getting disclosed. |
| A. | confidentiality |
| B. | integrity |
| C. | authentication |
| D. | availability |
| Answer» B. integrity | |
| 240. |
               of information means, only authorised users are capable of accessing the information. |
| A. | confidentiality |
| B. | integrity |
| C. | non-repudiation |
| D. | availability |
| Answer» B. integrity | |
| 241. |
             means the protection of data from modification by unknown users. |
| A. | confidentiality |
| B. | integrity |
| C. | authentication |
| D. | non-repudiation |
| Answer» C. authentication | |
| 242. |
CIA triad is also known as |
| A. | nic (non-repudiation, integrity, confidentiality) |
| B. | aic (availability, integrity, confidentiality) |
| C. | ain (availability, integrity, non-repudiation) |
| D. | aic (authenticity, integrity, confidentiality) |
| Answer» C. ain (availability, integrity, non-repudiation) | |
| 243. |
length of the IPv6 header is.... |
| A. | 64 bits |
| B. | 16 bits |
| C. | 32 bits |
| D. | 8 bits |
| Answer» D. 8 bits | |
| 244. |
IPSec provides ....protocols for network layer |
| A. | 7 |
| B. | 3 |
| C. | 1 |
| D. | 4 |
| Answer» B. 3 | |
| 245. |
length of the IPv6 acddress is .... |
| A. | 32 bits |
| B. | 64 bits |
| C. | 16 bits |
| D. | 128 bit |
| Answer» C. 16 bits | |
| 246. |
Transport layer Protocol consists of ... main components |
| A. | 2 |
| B. | 1 |
| C. | 3 |
| D. | 4 |
| Answer» B. 1 | |
| 247. |
SET stands for |
| A. | set electronic transaction |
| B. | secure electronic transaction |
| C. | simple electronic transaction |
| D. | none of the above |
| Answer» C. simple electronic transaction | |
| 248. |
PGP is abbreviated as |
| A. | pretty good privacy |
| B. | pretty good policy |
| C. | policy good privacy |
| D. | pretty good protection |
| Answer» B. pretty good policy | |
| 249. |
Internet Key Exchange has .... phases and modes of operations |
| A. | 4 |
| B. | 3 |
| C. | 2 |
| D. | 5 |
| Answer» D. 5 | |
| 250. |
IPSec operates in..... different modes |
| A. | 3 |
| B. | 2 |
| C. | 4 |
| D. | 5 |
| Answer» C. 4 | |