

MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
51. |
means when an attacker pretends to be authentic user |
A. | masquerade |
B. | replay |
C. | modification |
D. | traffic analysis |
Answer» B. replay | |
52. |
attack is when original data is modified and malicious data is inserted |
A. | masquerade |
B. | replay(rewrite) |
C. | modification |
D. | traffic analysis |
Answer» C. modification | |
53. |
Release of Message Content and Traffic analysis are type of : |
A. | both active and passive attacks |
B. | neither active and passive attacks |
C. | active attacks |
D. | passive attacks |
Answer» E. | |
54. |
3) Categories of Security Service |
A. | 1 |
B. | 1 &3 |
C. | 2& 3 |
D. | 1,2,3 |
Answer» E. | |
55. |
Which of the following attack can actively modify communications or data? |
A. | both active and passive attacks |
B. | neither active and passive attacks |
C. | active attacks |
D. | passive attacks |
Answer» D. passive attacks | |
56. |
What defines the restrictions on employees such as usage? |
A. | regulatory |
B. | advisory |
C. | availability |
D. | user policies |
Answer» E. | |
57. |
Policy is like standards rules and regulations set by the management to advise their employees on their activity or behavior |
A. | regulatory |
B. | advisory |
C. | availability |
D. | user policies |
Answer» C. availability | |
58. |
Which of the following are not security policies? |
A. | regulatory |
B. | advisory |
C. | availability |
D. | user policies |
Answer» D. user policies | |
59. |
Policy ensures that the organization is maintaining standards set by specific industry regulation. |
A. | regulatory |
B. | advisory |
C. | availability |
D. | user policies |
Answer» B. advisory | |
60. |
Examples of User Policies is/are: |
A. | password policies |
B. | internet usage |
C. | system use |
D. | all of the above |
Answer» E. | |
61. |
is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction. |
A. | network security |
B. | database security |
C. | information security |
D. | physical security |
Answer» D. physical security | |
62. |
When integrity is lacking in a security system, occurs. |
A. | database hacking |
B. | data deletion |
C. | data tampering |
D. | data leakage |
Answer» D. data leakage | |
63. |
of information means, only authorised users are capable of accessing the information. |
A. | confidentiality |
B. | integrity |
C. | non-repudiation |
D. | availability |
Answer» B. integrity | |
64. |
means the protection of data from modification by unknown users. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | non-repudiation |
Answer» C. authentication | |
65. |
SSL provides . |
A. | message integrity |
B. | confidentiality |
C. | compression |
D. | all of the above |
Answer» E. | |
66. |
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS basedconnection. |
A. | true |
B. | false |
Answer» B. false | |
67. |
is used for encrypting data at network level |
A. | ipsec |
B. | https |
C. | smtp |
D. | s/mime |
Answer» B. https | |
68. |
SSL primarily focuses on Pretty good privacy (PGP) is used in |
A. | integrity and authenticity |
B. | integrity and non-repudiation |
C. | authenticity and privacy |
D. | confidentiality andintegrity |
Answer» B. integrity and non-repudiation | |
69. |
In tunnel mode, IPSec protects the |
A. | entire ip packet |
B. | ip header |
C. | ip payload |
D. | ip trailer |
Answer» B. ip header | |
70. |
HTTPS is abbreviated as |
A. | secured hyper hypertexts transfer text transfer protocol secured protocol |
B. | none of the mentioned |
C. | hyperlinked text transfer protocol secured |
D. | hyper text transfer protocol secure |
Answer» E. | |
71. |
IPSec is designed to provide security at the |
A. | transport layer |
B. | network layer |
C. | application layer |
D. | session layer |
Answer» C. application layer | |
72. |
RSA algorithm is best example of |
A. | asymmetric keycryptography |
B. | symmetric keycryptography |
C. | elliptic curve cryptography |
D. | all of the above |
Answer» B. symmetric keycryptography | |
73. |
Hash function is used for |
A. | message authentication |
B. | digital signature |
C. | both a and b |
D. | only a |
Answer» D. only a | |
74. |
Diffie-Hellman algorithm is widely known as |
A. | key exchange algorithm |
B. | key agreementalgorithm |
C. | only a |
D. | both a and b |
Answer» E. | |
75. |
Public key cryptography also called as |
A. | asymmetric keycryptography |
B. | symmetric keycryptography |
C. | both a and b |
D. | none of the above |
Answer» B. symmetric keycryptography | |
76. |
In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n). |
A. | true |
B. | false |
Answer» C. | |
77. |
In RSA, Ф(n) = in terms of p and q. |
A. | (p)/(q) |
B. | (p)(q) |
C. | (p-1)(q-1) |
D. | (p+1)(q+1) |
Answer» D. (p+1)(q+1) | |
78. |
The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two partiesare not |
A. | authenticated |
B. | joined |
C. | submit |
D. | separate |
Answer» B. joined | |
79. |
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages,it is very slow if the message is |
A. | short |
B. | flat |
C. | long |
D. | thin |
Answer» D. thin | |
80. |
is the practice of concealing a message within another message,image or file. |
A. | steganography |
B. | cryptography |
C. | cipher |
D. | receiver |
Answer» B. cryptography | |
81. |
The is a polygraphic substitution cipher based on linear algebra. |
A. | hill cipher |
B. | playfair cipher |
C. | affine cipher |
D. | none of these |
Answer» B. playfair cipher | |
82. |
Conversion of plain text into Cipher text is called as . |
A. | encryption |
B. | decryption |
C. | hidden text |
D. | none of above |
Answer» B. decryption | |
83. |
The full form of OSI is OSI model . |
A. | open systemsinterconnection |
B. | open softwareinterconnection |
C. | open connection |
D. | open system internet |
Answer» B. open softwareinterconnection | |
84. |
The model is 7 layer architecture where each layer is having some specific functionality to perform. |
A. | tcp |
B. | osi |
C. | ois |
D. | none of these |
Answer» C. ois | |
85. |
is used to create the organisation's overall security program. |
A. | program policy |
B. | purpose |
C. | security |
D. | none of these |
Answer» B. purpose | |
86. |
means knowledge obtained from investigation, study , intelligence new ,facts . |
A. | security |
B. | data |
C. | information |
D. | none of these |
Answer» D. none of these | |
87. |
Security Measures Needed to protect during their transmission |
A. | file |
B. | data |
C. | packet |
D. | all of above |
Answer» C. packet | |
88. |
A digital signature needs a |
A. | private-key system |
B. | shared-key system |
C. | public-key system |
D. | all of them |
Answer» D. all of them | |
89. |
What is necessary for a cross-site script attack with cookies to be thwarted |
A. | captchas |
B. | virtual machines |
C. | proxies |
D. | firewalls |
Answer» B. virtual machines | |
90. |
In the course of conducting forensic analysis, which of the following actions are carried out? |
A. | critical thinking |
B. | fusion |
C. | validation |
D. | all of the above |
Answer» E. | |
91. |
Given the scope and consequences of violent crimes, it is advisable to seek out and preserve all available digital evidence. |
A. | true |
B. | false |
Answer» B. false | |
92. |
Computers and mobile devices are treated as _________ crime scenes in violent crime investigations. |
A. | temporary |
B. | immediate |
C. | remote |
D. | secondary |
Answer» E. | |
93. |
When reconstructing evidence surrounding a violent crime, it is generally helpful to: |
A. | lay out all the evidence so it can be viewed in its entirety |
B. | work with the crime scene technicians so that a better understanding of the crime is achieved |
C. | construct a timeline of events from digital evidence |
D. | begin the process of converting field notes to a final report |
Answer» D. begin the process of converting field notes to a final report | |
94. |
Of particular significance in the scientific method is the weight attached to finding evidence which supports a particular hypothesis |
A. | true |
B. | false |
Answer» B. false | |
95. |
When you have developed a theory, what can you do to confirm that your hypothesis is correct? |
A. | predict, based on your hypothesis, where artifacts should be located |
B. | perform experiments to test results and rule out alternate explanations |
C. | conclude, based on your findings, whether the evidence supports the hypothesis |
D. | all of the above |
Answer» E. | |
96. |
The _____________ documentation specifies who handled the evidence, when, where, and for what purpose. |
A. | evidence inventory |
B. | . chain of custody |
C. | evidence intake |
D. | preservation notes |
Answer» C. evidence intake | |
97. |
That part of cyberstalking where the offender is using the Internet to find a victim is known as: |
A. | profiling |
B. | trolling |
C. | surreptitious monitoring |
D. | none of the above. |
Answer» D. none of the above. | |
98. |
When a cyberstalking case is stalled, it is a good idea to interview the victim again, because: |
A. | the victim might have been withholding information during the first interview. |
B. | the information that investigators have gathered might help the victim recall additional details. |
C. | the time between the first and second interviews has given the victim time to seek counseling. |
D. | none of the above |
Answer» C. the time between the first and second interviews has given the victim time to seek counseling. | |
99. |
______uses the idea of certificate trust levels |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of them |
Answer» C. kdc | |
100. |
An implication from studies indicating that many stalkers had prior acquaintance with their victims is that: |
A. | part of the blame can be assigned to the victim. |
B. | the offender is likely to be found in the same area as the victim |
C. | investigators should pay particular attention to acquaintances of the victim |
D. | investigators should always check the immediate family |
Answer» D. investigators should always check the immediate family | |