MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 301. |
What is the key size allowed in PGP? |
| A. | 1024-1056 |
| B. | 1024-4056 |
| C. | 1024-4096 |
| D. | 1024-2048 |
| Answer» D. 1024-2048 | |
| 302. |
ISAKMP stands for ______ |
| A. | internet system association and key management packet |
| B. | internet security association and key management protocol |
| C. | interchange system and key modeling protocol |
| D. | internet security association and key modeling protocol |
| Answer» C. interchange system and key modeling protocol | |
| 303. |
______ was invented by Phil Zimmerman. |
| A. | ipsec |
| B. | ssl |
| C. | pgp |
| D. | none of the above |
| Answer» D. none of the above | |
| 304. |
In _______, the cryptographic algorithms and secrets are sent with the message. |
| A. | ipsec |
| B. | ssl |
| C. | tls |
| D. | pgp |
| Answer» E. | |
| 305. |
PGP makes use of which cryptographic algorithm? |
| A. | des |
| B. | aes |
| C. | rsa |
| D. | rabin |
| Answer» D. rabin | |
| 306. |
In _____, there can be multiple paths from fully or partially trusted authorities. |
| A. | x509 |
| B. | pgp |
| C. | kdc |
| D. | none of the above |
| Answer» C. kdc | |
| 307. |
______ provides authentication at the IP level. |
| A. | ah |
| B. | esp |
| C. | pgp |
| D. | ssl |
| Answer» B. esp | |
| 308. |
________ provides privacy, integrity, and authentication in e-mail. |
| A. | ipsec |
| B. | ssl |
| C. | pgp |
| D. | none of the above |
| Answer» D. none of the above | |
| 309. |
_______ uses the idea of certificate trust levels. |
| A. | x509 |
| B. | pgp |
| C. | kdc |
| D. | none of the above |
| Answer» C. kdc | |
| 310. |
In ______, there is a single path from the fully trusted authority to any certificate. |
| A. | x509 |
| B. | pgp |
| C. | kdc |
| D. | none of the above |
| Answer» B. pgp | |
| 311. |
IKE uses _______ |
| A. | oakley |
| B. | skeme |
| C. | isakmp |
| D. | all of the above |
| Answer» E. | |
| 312. |
SSL provides _________. |
| A. | message integrity |
| B. | confidentiality |
| C. | compression |
| D. | all of the above |
| Answer» E. | |
| 313. |
PGP encrypts data by using a block cipher called ______ |
| A. | international data encryption algorithm |
| B. | private data encryption algorithm |
| C. | internet data encryption algorithm |
| D. | local data encryption algorithm |
| Answer» B. private data encryption algorithm | |
| 314. |
Pretty good privacy (PGP) is used in ______ |
| A. | browser security |
| B. | email security |
| C. | ftp security |
| D. | wifi security |
| Answer» C. ftp security | |
| 315. |
IKE creates SAs for _____. |
| A. | ssl |
| B. | pgp |
| C. | ipsec |
| D. | vp |
| Answer» D. vp | |
| 316. |
In tunnel mode, IPSec protects the ______ |
| A. | entire ip packet |
| B. | ip header |
| C. | ip payload |
| D. | ip trailer |
| Answer» B. ip header | |
| 317. |
There are ________ types of VPN protocols. |
| A. | 3 |
| B. | 4 |
| C. | 5 |
| D. | 6 |
| Answer» E. | |
| 318. |
Site-to-Site VPN architecture is also known as _________ |
| A. | remote connection based vpns |
| B. | peer-to-peer vpns |
| C. | extranet based vpn |
| D. | country-to-country vpns |
| Answer» D. country-to-country vpns | |
| 319. |
Which types of VPNs are used for corporate connectivity across companies residing in different geographical location? |
| A. | remote access vpns |
| B. | site-to-site vpns |
| C. | peer-to-peer vpns |
| D. | country-to-country vpns |
| Answer» C. peer-to-peer vpns | |
| 320. |
_________ type of VPNs are used for home private and secure connectivity. |
| A. | remote access vpns |
| B. | site-to-site vpns |
| C. | peer-to-peer vpns |
| D. | router-to-router vpns |
| Answer» B. site-to-site vpns | |
| 321. |
There are _________ types of VPNs. |
| A. | 3 |
| B. | 2 |
| C. | 5 |
| D. | 4 |
| Answer» C. 5 | |
| 322. |
VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 323. |
What types of protocols are used in VPNs? |
| A. | application level protocols |
| B. | tunnelling protocols |
| C. | network protocols |
| D. | mailing protocols |
| Answer» B. tunnelling protocols | |
| 324. |
Which of the statements are not true to classify VPN systems? |
| A. | protocols used for tunnelling the traffic |
| B. | whether vpns are providing site-to-site or remote access connection |
| C. | securing the network from bots and malwares |
| D. | levels of security provided for sending and receiving data privately |
| Answer» D. levels of security provided for sending and receiving data privately | |
| 325. |
__________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network. |
| A. | visual private network |
| B. | virtual protocol network |
| C. | virtual protocol networking |
| D. | virtual private network |
| Answer» E. | |
| 326. |
1. VPN is abbreviated as __________ |
| A. | visual private network |
| B. | virtual protocol network |
| C. | virtual private network |
| D. | virtual protocol networking |
| Answer» D. virtual protocol networking | |
| 327. |
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other. |
| A. | man-in-the-middle |
| B. | ciphertext attack |
| C. | plaintext attack |
| D. | none of the above |
| Answer» B. ciphertext attack | |
| 328. |
he ________ method provides a one-time session key for two parties. |
| A. | diffie-hellman |
| B. | rsa |
| C. | des |
| D. | aes |
| Answer» B. rsa | |
| 329. |
In the handshake protocol which is the message type first sent between client and server ? |
| A. | server_hello |
| B. | client_hello |
| C. | hello_request |
| D. | certificate_request |
| Answer» C. hello_request | |
| 330. |
One commonly used public-key cryptography method is the ______ algorithm. |
| A. | rss |
| B. | ras |
| C. | rsa |
| D. | raa |
| Answer» D. raa | |
| 331. |
The DSS signature uses which hash algorithm? |
| A. | md5 |
| B. | sha-2 |
| C. | sha-1 |
| D. | does not use hash algorithm |
| Answer» D. does not use hash algorithm | |
| 332. |
The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key. |
| A. | true |
| B. | false |
| Answer» C. | |
| 333. |
What is the size of the RSA signature hash after the MD5 and SHA-1 processing? |
| A. | 42 bytes |
| B. | 32 bytes |
| C. | 36 bytes |
| D. | 48 bytes |
| Answer» D. 48 bytes | |
| 334. |
Message authentication code is also known as |
| A. | key code |
| B. | hash code |
| C. | keyed hash function |
| D. | message key hash function |
| Answer» C. keyed hash function | |
| 335. |
When a hash function is used to provide message authentication, the hash function value is referred to as |
| A. | message field |
| B. | message digest |
| C. | message score |
| D. | message leap |
| Answer» E. | |
| 336. |
ECC stands for |
| A. | elliptic curve cryptography |
| B. | enhanced curve cryptography |
| C. | elliptic cone cryptography |
| D. | eclipse curve cryptography |
| Answer» B. enhanced curve cryptography | |
| 337. |
“Elliptic curve cryptography follows the associative property.†|
| A. | true |
| B. | false |
| Answer» B. false | |
| 338. |
Extensions to the X.509 certificates were added in version ____ |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» D. 4 | |
| 339. |
A digital signature needs ____ system |
| A. | symmetric-key |
| B. | asymmetric-key |
| C. | either (a) or (b) |
| D. | neither (a) nor (b) |
| Answer» C. either (a) or (b) | |
| 340. |
________function creates a message digest out of a message. |
| A. | encryption |
| B. | decryption |
| C. | hash |
| D. | none of the above |
| Answer» D. none of the above | |
| 341. |
ECC encryption system is __________ |
| A. | symmetric key encryption algorithm |
| B. | asymmetric key encryption algorithm |
| C. | not an encryption algorithm |
| D. | block cipher method |
| Answer» C. not an encryption algorithm | |
| 342. |
How many rounds does the AES-192 perform? |
| A. | 10 |
| B. | 12 |
| C. | 14 |
| D. | 16 |
| Answer» C. 14 | |
| 343. |
The procedure to add bits to the last block is termed as _________________ |
| A. | decryption |
| B. | hashing |
| C. | tuning |
| D. | padding |
| Answer» E. | |
| 344. |
Conventional cryptography is also known as _____________ or symmetric-key encryption. |
| A. | secret-key |
| B. | public key |
| C. | protected key |
| D. | primary key |
| Answer» B. public key | |
| 345. |
4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data. |
| A. | secret key |
| B. | external programs |
| C. | add-ons |
| D. | secondary key |
| Answer» B. external programs | |
| 346. |
______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it. |
| A. | malware analysis |
| B. | cryptography |
| C. | reverse engineering |
| D. | exploit writing |
| Answer» C. reverse engineering | |
| 347. |
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. |
| A. | malware analysis |
| B. | exploit writing |
| C. | reverse engineering |
| D. | cryptography |
| Answer» E. | |
| 348. |
In asymmetric key cryptography, the two keys e and d, have special relationship to |
| A. | others |
| B. | data |
| C. | keys |
| D. | each other |
| Answer» E. | |
| 349. |
A asymmetric-key (or public key ) cipher uses |
| A. | 1 key |
| B. | 2 key |
| C. | 3 key |
| D. | 4 key |
| Answer» C. 3 key | |
| 350. |
Which one of the following algorithm is not used in asymmetric-key cryptography? |
| A. | rsa algorithm |
| B. | diffie-hellman algorithm |
| C. | electronic code book algorithm |
| D. | dsa algorithm |
| Answer» D. dsa algorithm | |