Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

51.

means when an attacker pretends to be authentic user

A. masquerade
B. replay
C. modification
D. traffic analysis
Answer» B. replay
52.

attack is when original data is modified and malicious data is inserted

A. masquerade
B. replay(rewrite)
C. modification
D. traffic analysis
Answer» C. modification
53.

Release of Message Content and Traffic analysis are type of :

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» E.
54.

3) Categories of Security Service

A. 1
B. 1 &3
C. 2& 3
D. 1,2,3
Answer» E.
55.

Which of the following attack can actively modify communications or data?

A. both active and passive attacks
B. neither active and passive attacks
C. active attacks
D. passive attacks
Answer» D. passive attacks
56.

What defines the restrictions on employees such as usage?

A. regulatory
B. advisory
C. availability
D. user policies
Answer» E.
57.

Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior

A. regulatory
B. advisory
C. availability
D. user policies
Answer» C. availability
58.

Which of the following are not security policies?

A. regulatory
B. advisory
C. availability
D. user policies
Answer» D. user policies
59.

Policy ensures that the organization is maintaining standards set by specific industry regulation.

A. regulatory
B. advisory
C. availability
D. user policies
Answer» B. advisory
60.

Examples of User Policies is/are:

A. password policies
B. internet usage
C. system use
D. all of the above
Answer» E.
61.

is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

A. network security
B. database security
C. information security
D. physical security
Answer» D. physical security
62.

When integrity is lacking in a security system,                     occurs.

A. database hacking
B. data deletion
C. data tampering
D. data leakage
Answer» D. data leakage
63.

of information means, only authorised users are capable of accessing the information.

A. confidentiality
B. integrity
C. non-repudiation
D. availability
Answer» B. integrity
64.

means the protection of data from modification by unknown users.

A. confidentiality
B. integrity
C. authentication
D. non-repudiation
Answer» C. authentication
65.

SSL provides .

A. message integrity
B. confidentiality
C. compression
D. all of the above
Answer» E.
66.

TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS basedconnection.

A. true
B. false
Answer» B. false
67.

is used for encrypting data at network level

A. ipsec
B. https
C. smtp
D. s/mime
Answer» B. https
68.

SSL primarily focuses on                  Pretty good privacy (PGP) is used in

A. integrity and authenticity
B. integrity and non-repudiation
C. authenticity and privacy
D. confidentiality andintegrity
Answer» B. integrity and non-repudiation
69.

In tunnel mode, IPSec protects the

A. entire ip packet
B. ip header
C. ip payload
D. ip trailer
Answer» B. ip header
70.

HTTPS is abbreviated as

A. secured hyper hypertexts transfer text transfer protocol secured protocol
B. none of the mentioned
C. hyperlinked text transfer protocol secured
D. hyper text transfer protocol secure
Answer» E.
71.

IPSec is designed to provide security at the

A. transport layer
B. network layer
C. application layer
D. session layer
Answer» C. application layer
72.

RSA algorithm is best example of

A. asymmetric keycryptography
B. symmetric keycryptography
C. elliptic curve cryptography
D. all of the above
Answer» B. symmetric keycryptography
73.

Hash function is used for

A. message authentication
B. digital signature
C. both a and b
D. only a
Answer» D. only a
74.

Diffie-Hellman algorithm is widely known as

A. key exchange algorithm
B. key agreementalgorithm
C. only a
D. both a and b
Answer» E.
75.

Public key cryptography also called as

A. asymmetric keycryptography
B. symmetric keycryptography
C. both a and b
D. none of the above
Answer» B. symmetric keycryptography
76.

In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).

A. true
B. false
Answer» C.
77.

In RSA, Ф(n) = in terms of p and q.

A. (p)/(q)
B. (p)(q)
C. (p-1)(q-1)
D. (p+1)(q+1)
Answer» D. (p+1)(q+1)
78.

The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two partiesare not

A. authenticated
B. joined
C. submit
D. separate
Answer» B. joined
79.

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages,it is very slow if the message is

A. short
B. flat
C. long
D. thin
Answer» D. thin
80.

is the practice of concealing a message within another message,image or file.

A. steganography
B. cryptography
C. cipher
D. receiver
Answer» B. cryptography
81.

The is a polygraphic substitution cipher based on linear algebra.

A. hill cipher
B. playfair cipher
C. affine cipher
D. none of these
Answer» B. playfair cipher
82.

Conversion of plain text into Cipher text is called as .

A. encryption
B. decryption
C. hidden text
D. none of above
Answer» B. decryption
83.

The full form of OSI is OSI model .

A. open systemsinterconnection
B. open softwareinterconnection
C. open connection
D. open system internet
Answer» B. open softwareinterconnection
84.

The model is 7 layer architecture where each layer is having some specific functionality to perform.

A. tcp
B. osi
C. ois
D. none of these
Answer» C. ois
85.

is used to create the organisation's overall security program.

A. program policy
B. purpose
C. security
D. none of these
Answer» B. purpose
86.

means knowledge obtained from investigation, study , intelligence new ,facts .

A. security
B. data
C. information
D. none of these
Answer» D. none of these
87.

Security Measures Needed to protect during their transmission

A. file
B. data
C. packet
D. all of above
Answer» C. packet
88.

A digital signature needs a

A. private-key system
B. shared-key system
C. public-key system
D. all of them
Answer» D. all of them
89.

What is necessary for a cross-site script attack with cookies to be thwarted

A. captchas
B. virtual machines
C. proxies
D. firewalls
Answer» B. virtual machines
90.

In the course of conducting forensic analysis, which of the following actions are carried out?

A. critical thinking
B. fusion
C. validation
D. all of the above
Answer» E.
91.

Given the scope and consequences of violent crimes, it is advisable to seek out and preserve all available digital evidence.

A. true
B. false
Answer» B. false
92.

Computers and mobile devices are treated as _________ crime scenes in violent crime investigations.

A. temporary
B. immediate
C. remote
D. secondary
Answer» E.
93.

When reconstructing evidence surrounding a violent crime, it is generally helpful to:

A. lay out all the evidence so it can be viewed in its entirety
B. work with the crime scene technicians so that a better understanding of the crime is achieved
C. construct a timeline of events from digital evidence
D. begin the process of converting field notes to a final report
Answer» D. begin the process of converting field notes to a final report
94.

Of particular significance in the scientific method is the weight attached to finding evidence which supports a particular hypothesis

A. true
B. false
Answer» B. false
95.

When you have developed a theory, what can you do to confirm that your hypothesis is correct?

A. predict, based on your hypothesis, where artifacts should be located
B. perform experiments to test results and rule out alternate explanations
C. conclude, based on your findings, whether the evidence supports the hypothesis
D. all of the above
Answer» E.
96.

The _____________ documentation specifies who handled the evidence, when, where, and for what purpose.

A. evidence inventory
B. . chain of custody
C. evidence intake
D. preservation notes
Answer» C. evidence intake
97.

That part of cyberstalking where the offender is using the Internet to find a victim is known as:

A. profiling
B. trolling
C. surreptitious monitoring
D. none of the above.
Answer» D. none of the above.
98.

When a cyberstalking case is stalled, it is a good idea to interview the victim again, because:

A. the victim might have been withholding information during the first interview.
B. the information that investigators have gathered might help the victim recall additional details.
C. the time between the first and second interviews has given the victim time to seek counseling.
D. none of the above
Answer» C. the time between the first and second interviews has given the victim time to seek counseling.
99.

______uses the idea of certificate trust levels

A. x509
B. pgp
C. kdc
D. none of them
Answer» C. kdc
100.

An implication from studies indicating that many stalkers had prior acquaintance with their victims is that:

A. part of the blame can be assigned to the victim.
B. the offender is likely to be found in the same area as the victim
C. investigators should pay particular attention to acquaintances of the victim
D. investigators should always check the immediate family
Answer» D. investigators should always check the immediate family