MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 252. |
length of the IPv4 address is .... |
| A. | 32 bits |
| B. | 64 bits |
| C. | 16 bits |
| D. | 128 bit |
| Answer» B. 64 bits | |
| 253. |
Which of the following is not a strong security protocol |
| A. | ssl |
| B. | httpl |
| C. | smtp |
| D. | sftp |
| Answer» D. sftp | |
| 254. |
WPA2 is used for security in _______ |
| A. | ethernet |
| B. | wi-fi |
| C. | bluetooth |
| D. | |
| Answer» C. bluetooth | |
| 255. |
__________ is used for encrypting data at network level |
| A. | ipsec |
| B. | https |
| C. | smtp |
| D. | s/mime |
| Answer» B. https | |
| 256. |
SSL primarily focuses on _______ |
| A. | integrity and authenticity |
| B. | integrity and non-repudiation |
| C. | authenticity and privacy |
| D. | confidentiality and integrity |
| Answer» B. integrity and non-repudiation | |
| 257. |
An attempt to make a computer resource unavailable to its intended users is called ______ |
| A. | denial-of-service attack |
| B. | virus attack |
| C. | worms attack |
| D. | botnet process |
| Answer» B. virus attack | |
| 258. |
HTTPS is abbreviated as _________ |
| A. | hypertexts transfer protocol secured |
| B. | secured hyper text transfer protocol |
| C. | hyperlinked text transfer protocol secured |
| D. | hyper text transfer protocol secure |
| Answer» E. | |
| 259. |
RSA algorithm is best example of_______ |
| A. | asymmetric key cryptography |
| B. | symmetric key cryptography |
| C. | elliptic curve cryptography |
| D. | all of the above |
| Answer» B. symmetric key cryptography | |
| 260. |
Hash function is used for________ |
| A. | message authentication |
| B. | digital signature |
| C. | both a and b |
| D. | only a |
| Answer» D. only a | |
| 261. |
Diffie-Hellman algorithm is widely known as_________ |
| A. | key exchange algorithm |
| B. | key agreement algorithm |
| C. | only a |
| D. | both a and b |
| Answer» E. | |
| 262. |
Public key cryptography also called as________ |
| A. | asymmetric key cryptography |
| B. | symmetric key cryptography |
| C. | both a and b |
| D. | none of the above |
| Answer» B. symmetric key cryptography | |
| 263. |
USENET falls under which category of public key sharing? |
| A. | public announcement |
| B. | publicly available directory |
| C. | public key authority |
| D. | public key certificate |
| Answer» B. publicly available directory | |
| 264. |
RSA is also a stream cipher like Merkel-Hellman. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 265. |
In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n). |
| A. | true |
| B. | false |
| Answer» C. | |
| 266. |
In RSA, Ф(n) = _______ in terms of p and q. |
| A. | Â (p)/(q) |
| B. | Â (p)(q) |
| C. | (p-1)(q-1) |
| D. | Â (p+1)(q+1) |
| Answer» D. Â (p+1)(q+1) | |
| 267. |
For RSA to work, the value of P must be less than the value of |
| A. | p |
| B. | q |
| C. | n |
| D. | r |
| Answer» D. r | |
| 268. |
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to |
| A. | other |
| B. | data |
| C. | keys |
| D. | each other |
| Answer» E. | |
| 269. |
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is |
| A. | short |
| B. | flat |
| C. | long |
| D. | thin |
| Answer» D. thin | |
| 270. |
In cryptography the original message before being transform is called |
| A. | simple text |
| B. | plain text |
| C. | empty text |
| D. | filled text |
| Answer» C. empty text | |
| 271. |
__is the practice of concealing a message within another message,image or file. |
| A. | steganography |
| B. | cryptography |
| C. | cipher |
| D. | receiver |
| Answer» B. cryptography | |
| 272. |
The__is a polygraphic substitution cipher based on linear algebra. |
| A. | hill cipher |
| B. | playfair cipher |
| C. | affine cipher |
| D. | none of these |
| Answer» B. playfair cipher | |
| 273. |
An asymmetric-key (or public-key) cipher uses |
| A. | 1 key |
| B. | 2 key |
| C. | 3 key |
| D. | 4 key |
| Answer» B. 2 key | |
| 274. |
The message which is not understandable is called as? |
| A. | cipher text |
| B. | plain text |
| C. | hidden text |
| D. | both a & c |
| Answer» B. plain text | |
| 275. |
In AES in which Round Subkeys are Generated from Original key for each round? |
| A. | key expansion |
| B. | initial round |
| C. | finale round |
| D. | none of these |
| Answer» B. initial round | |
| 276. |
Which of them is type of Cipher? |
| A. | stream cipher |
| B. | block cipher |
| C. | both of them |
| D. | none of these |
| Answer» D. none of these | |
| 277. |
AES stands for? |
| A. | authorized encryption standard |
| B. | advance encryption standard |
| C. | advance encryption strategy |
| D. | none of these |
| Answer» C. advance encryption strategy | |
| 278. |
What is the 4th step in DES Algorithm? |
| A. | key transformation |
| B. | s-box substitution |
| C. | p-box permutation |
| D. | expansion permutation |
| Answer» D. expansion permutation | |
| 279. |
In DES step both LPT and RPT undergoes in how much key Rounds? |
| A. | 8 |
| B. | 16 |
| C. | 32 |
| D. | 64 |
| Answer» C. 32 | |
| 280. |
Blum Blum Shub Generator is based on which Algorithm? |
| A. | private key |
| B. | public key |
| C. | both a & b |
| D. | none of these |
| Answer» C. both a & b | |
| 281. |
In Symmetric schemes requires both parties to share how many secret key? |
| A. | one |
| B. | two |
| C. | three |
| D. | four |
| Answer» B. two | |
| 282. |
The technique in which when one character is replaced by another Character is called as? |
| A. | transposition |
| B. | substitution |
| C. | combinational |
| D. | none of these |
| Answer» C. combinational | |
| 283. |
Conversion of plain text into Cipher text is called as________. |
| A. | encryption |
| B. | decryption |
| C. | hidden text |
| D. | none of above |
| Answer» B. decryption | |
| 284. |
The full form of OSI is OSI model__. |
| A. | open systems interconnection |
| B. | open software interconnection |
| C. | open connection |
| D. | open system internet |
| Answer» B. open software interconnection | |
| 285. |
The__model is 7 layer architecture where each layer is having some specific functionality to perform. |
| A. | tcp |
| B. | osi |
| C. | ois |
| D. | none of these |
| Answer» C. ois | |
| 286. |
__is used to create the organisation's overall security program. |
| A. | program policy |
| B. | purpose |
| C. | security |
| D. | none of these |
| Answer» B. purpose | |
| 287. |
A way to ensure that the entity is indeed what it claims to be.- |
| A. | authentication |
| B. | accountability |
| C. | identification |
| D. | security |
| Answer» B. accountability | |
| 288. |
Conversion of Cypher text to plain text? |
| A. | encryption |
| B. | decryption |
| C. | simple text |
| D. | none of these |
| Answer» C. simple text | |
| 289. |
An act of protecting information from unauthorised disclouser to an entity.- |
| A. | intergrity |
| B. | avability |
| C. | confidentiality |
| D. | none of these |
| Answer» D. none of these | |
| 290. |
Symmetric key encryption is also called as? |
| A. | public key encryption |
| B. | private key encryption |
| C. | both of these |
| D. | none of these |
| Answer» C. both of these | |
| 291. |
A hacker guessing suggested password to a program is call as? |
| A. | password guessing |
| B. | dictionary attack |
| C. | default password attack |
| D. | none of these |
| Answer» D. none of these | |
| 292. |
What is full form of DDoS? |
| A. | derived denial of service |
| B. | distributed denial of service |
| C. | denial of service |
| D. | none of these |
| Answer» C. denial of service | |
| 293. |
Which One of them is Passive attack? |
| A. | denial of service |
| B. | modify message in transit |
| C. | replay previous message |
| D. | obtain message contain |
| Answer» E. | |
| 294. |
What is lying of IP address called as? |
| A. | ip spoofing |
| B. | ip scamming |
| C. | ip lying |
| D. | none of theses |
| Answer» B. ip scamming | |
| 295. |
Protection against Denial by one of these parties in a communication refers to? |
| A. | non-repudiation |
| B. | data integrity |
| C. | authentication |
| D. | none of these |
| Answer» B. data integrity | |
| 296. |
Prevention of the unauthorised used of Resources refers too? |
| A. | data integrity |
| B. | data confidentiality |
| C. | acess control |
| D. | none of these |
| Answer» D. none of these | |
| 297. |
__________ means knowledge obtained from investigation, study , intelligence new ,facts . |
| A. | security |
| B. | data |
| C. | information |
| D. | none of these |
| Answer» D. none of these | |
| 298. |
Security Measures Needed to protect ________ during their transmission |
| A. | file |
| B. | data |
| C. | packet |
| D. | all of above |
| Answer» C. packet | |
| 299. |
S/MIME is abbreviated as __________________ |
| A. | secure/multimedia internet mailing extensions |
| B. | secure/multipurpose internet mailing extensions |
| C. | secure/multimedia internet mail extensions |
| D. | secure/multipurpose internet mail extensions |
| Answer» E. | |
| 300. |
In SSL, what is used for authenticating a message? |
| A. | mac (message access code) |
| B. | mac (message authentication code) |
| C. | mac (machine authentication code) |
| D. | mac (machine access code) |
| Answer» C. mac (machine authentication code) | |