MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 351. |
In asymmetric key cryptography, the private key is kept by __________ |
| A. | sender |
| B. | receiver |
| C. | sender and receiver |
| D. | all the connected devices to the network |
| Answer» C. sender and receiver | |
| 352. |
What is data encryption standard (DES)? |
| A. | block cipher |
| B. | stream cipher |
| C. | bit cipher |
| D. | byte cipher |
| Answer» B. stream cipher | |
| 353. |
In cryptography, the order of the letters in a message is rearranged by __________ |
| A. | transpositional ciphers |
| B. | substitution ciphers |
| C. | both transpositional ciphers and substitution ciphers |
| D. | quadratic ciphers |
| Answer» B. substitution ciphers | |
| 354. |
In cryptography, what is cipher? |
| A. | algorithm for performing encryption and decryption |
| B. | encrypted message |
| C. | both algorithm for performing encryption and decryption and encrypted message |
| D. | decrypted message |
| Answer» B. encrypted message | |
| 355. |
Which is the largest disadvantage of the symmetric Encryption? |
| A. | more complex and therefore more time-consuming calculations. |
| B. | problem of the secure transmission of the secret key. |
| C. | less secure encryption function. |
| D. | isn\t used any more. |
| Answer» C. less secure encryption function. | |
| 356. |
Which of the following Algorithms not belong to symmetric encryption |
| A. | 3des (tripledes) |
| B. | rsa |
| C. | rc5 |
| D. | idea |
| Answer» C. rc5 | |
| 357. |
What type of attack uses a fraudulent server with a relay address? |
| A. | ntlm |
| B. | mitm |
| C. | netbios |
| D. | smb |
| Answer» C. netbios | |
| 358. |
The ________ is encrypted text. |
| A. | a) cipher scricpt |
| B. | b) cipher text |
| C. | c) secret text |
| D. | d) secret script |
| Answer» C. c) secret text | |
| 359. |
Release of message contents and Traffic analysis are two types of _________ attacks. |
| A. | a) active attack |
| B. | b) modification of attack |
| C. | c) passive attack |
| D. | d) dos attack |
| Answer» D. d) dos attack | |
| 360. |
A company requires its users to change passwords every month. This improves the ________ of the network. |
| A. | a) performance |
| B. | b) reliability |
| C. | c) security |
| D. | d) none of the above |
| Answer» D. d) none of the above | |
| 361. |
What does OSI stand for in the OSI Security Architecure? |
| A. | a) open system interface |
| B. | b) open systems interconnections |
| C. | c) open source initiative |
| D. | d) open standard interconnections |
| Answer» C. c) open source initiative | |
| 362. |
Data ___________ is used to ensure confidentiality. |
| A. | a) encryption |
| B. | b) locking |
| C. | c) decryption |
| D. | d) backup |
| Answer» B. b) locking | |
| 363. |
This helps in identifying the origin of information and authentic user. This referred to here as __________ |
| A. | a) confidentiality |
| B. | b) integrity |
| C. | c) authenticity |
| D. | d) availability |
| Answer» D. d) availability | |
| 364. |
_______ of information means, only authorized users are capable of accessing the information. |
| A. | a) confidentiality |
| B. | b) integrity |
| C. | c) non-repudiation |
| D. | d) availability |
| Answer» E. | |
| 365. |
When you use the word ______it means you are protecting your data from getting disclosed. |
| A. | a) confidentiality |
| B. | b) integrity |
| C. | c) authentication |
| D. | d) availability |
| Answer» B. b) integrity | |
| 366. |
_______ means the protection of data from modification by unknown users. |
| A. | a) confidentiality |
| B. | b) integrity |
| C. | c) authentication |
| D. | d) non-repudiation |
| Answer» C. c) authentication | |
| 367. |
Related to information security, confidentiality is the opposite of which of the following? |
| A. | a) closure |
| B. | b) disclosure |
| C. | c) disaster |
| D. | d) disposal |
| Answer» C. c) disaster | |
| 368. |
The CIA triad is often represented by which of the following? |
| A. | a) triangle |
| B. | b) diagonal |
| C. | c) ellipse |
| D. | d) circle |
| Answer» B. b) diagonal | |
| 369. |
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______ |
| A. | a) cyber-crime |
| B. | b) cyber attack |
| C. | c) system hijacking |
| D. | d) digital crime |
| Answer» C. c) system hijacking | |
| 370. |
_______ platforms are used for safety and protection of information in the cloud. |
| A. | a) cloud workload protection platforms |
| B. | b) cloud security protocols |
| C. | c) aws |
| D. | d) one drive |
| Answer» B. b) cloud security protocols | |
| 371. |
_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction. |
| A. | a) network security |
| B. | b) database security |
| C. | c) information security |
| D. | d) physical security |
| Answer» D. d) physical security | |
| 372. |
Compromising confidential information comes under _________ |
| A. | a) bug |
| B. | b) threat |
| C. | c) vulnerability |
| D. | d) attack |
| Answer» C. c) vulnerability | |
| 373. |
What are the two primary classifications of cross-site scripting? |
| A. | dom based and persistent |
| B. | traditional and dom based |
| C. | traditional and non-persistent |
| D. | non-persistent and persistent |
| Answer» E. | |
| 374. |
What is one advantage of setting up a DMZ with two firewalls? |
| A. | you can control where traffic goes in three networks |
| B. | you can do stateful packet filtering |
| C. | you can do load balancing |
| D. | ??improved network performance |
| Answer» D. ??improved network performance | |
| 375. |
For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset. |
| A. | ticket |
| B. | local |
| C. | token |
| D. | user |
| Answer» B. local | |
| 376. |
The basic Web Services platform is combination of _____ and _______ |
| A. | css + http |
| B. | xml + html |
| C. | xml + http |
| D. | css + java |
| Answer» D. css + java | |
| 377. |
For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keysâ€. |
| A. | key |
| B. | realm |
| C. | document |
| D. | none of the mentioned |
| Answer» C. document | |
| 378. |
In the _______ mode, IPSec protects the whole IP packet, including the original IP header. |
| A. | transport |
| B. | tunnel |
| C. | either (a) or (b) |
| D. | neither (a) nor (b) |
| Answer» C. either (a) or (b) | |
| 379. |
The _______ mode is normally used when we need host-to-host (end-to-end) protection of data. |
| A. | transport |
| B. | tunnel |
| C. | either (a) or (b) |
| D. | neither (a) nor (b) |
| Answer» B. tunnel | |