Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

251.

TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection.

A. true
B. false
Answer» B. false
252.

length of the IPv4 address is ....

A. 32 bits
B. 64 bits
C. 16 bits
D. 128 bit
Answer» B. 64 bits
253.

Which of the following is not a strong security protocol

A. ssl
B. httpl
C. smtp
D. sftp
Answer» D. sftp
254.

WPA2 is used for security in _______

A. ethernet
B. wi-fi
C. bluetooth
D. e-mail
Answer» C. bluetooth
255.

__________ is used for encrypting data at network level

A. ipsec
B. https
C. smtp
D. s/mime
Answer» B. https
256.

SSL primarily focuses on _______

A. integrity and authenticity
B. integrity and non-repudiation
C. authenticity and privacy
D. confidentiality and integrity
Answer» B. integrity and non-repudiation
257.

An attempt to make a computer resource unavailable to its intended users is called ______

A. denial-of-service attack
B. virus attack
C. worms attack
D. botnet process
Answer» B. virus attack
258.

HTTPS is abbreviated as _________

A. hypertexts transfer protocol secured
B. secured hyper text transfer protocol
C. hyperlinked text transfer protocol secured
D. hyper text transfer protocol secure
Answer» E.
259.

RSA algorithm is best example of_______

A. asymmetric key cryptography
B. symmetric key cryptography
C. elliptic curve cryptography
D. all of the above
Answer» B. symmetric key cryptography
260.

Hash function is used for________

A. message authentication
B. digital signature
C. both a and b
D. only a
Answer» D. only a
261.

Diffie-Hellman algorithm is widely known as_________

A. key exchange algorithm
B. key agreement algorithm
C. only a
D. both a and b
Answer» E.
262.

Public key cryptography also called as________

A. asymmetric key cryptography
B. symmetric key cryptography
C. both a and b
D. none of the above
Answer» B. symmetric key cryptography
263.

USENET falls under which category of public key sharing?

A. public announcement
B. publicly available directory
C. public key authority
D. public key certificate
Answer» B. publicly available directory
264.

RSA is also a stream cipher like Merkel-Hellman.

A. true
B. false
Answer» B. false
265.

In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).

A. true
B. false
Answer» C.
266.

In RSA, Ф(n) = _______ in terms of p and q.

A.  (p)/(q)
B.  (p)(q)
C. (p-1)(q-1)
D.  (p+1)(q+1)
Answer» D.  (p+1)(q+1)
267.

For RSA to work, the value of P must be less than the value of

A. p
B. q
C. n
D. r
Answer» D. r
268.

In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

A. other
B. data
C. keys
D. each other
Answer» E.
269.

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

A. short
B. flat
C. long
D. thin
Answer» D. thin
270.

In cryptography the original message before being transform is called

A. simple text
B. plain text
C. empty text
D. filled text
Answer» C. empty text
271.

__is the practice of concealing a message within another message,image or file.

A. steganography
B. cryptography
C. cipher
D. receiver
Answer» B. cryptography
272.

The__is a polygraphic substitution cipher based on linear algebra.

A. hill cipher
B. playfair cipher
C. affine cipher
D. none of these
Answer» B. playfair cipher
273.

An asymmetric-key (or public-key) cipher uses

A. 1 key
B. 2 key
C. 3 key
D. 4 key
Answer» B. 2 key
274.

The message which is not understandable is called as?

A. cipher text
B. plain text
C. hidden text
D. both a & c
Answer» B. plain text
275.

In AES in which Round Subkeys are Generated from Original key for each round?

A. key expansion
B. initial round
C. finale round
D. none of these
Answer» B. initial round
276.

Which of them is type of Cipher?

A. stream cipher
B. block cipher
C. both of them
D. none of these
Answer» D. none of these
277.

AES stands for?

A. authorized encryption standard
B. advance encryption standard
C. advance encryption strategy
D. none of these
Answer» C. advance encryption strategy
278.

What is the 4th step in DES Algorithm?

A. key transformation
B. s-box substitution
C. p-box permutation
D. expansion permutation
Answer» D. expansion permutation
279.

In DES step both LPT and RPT undergoes in how much key Rounds?

A. 8
B. 16
C. 32
D. 64
Answer» C. 32
280.

Blum Blum Shub Generator is based on which Algorithm?

A. private key
B. public key
C. both a & b
D. none of these
Answer» C. both a & b
281.

In Symmetric schemes requires both parties to share how many secret key?

A. one
B. two
C. three
D. four
Answer» B. two
282.

The technique in which when one character is replaced by another Character is called as?

A. transposition
B. substitution
C. combinational
D. none of these
Answer» C. combinational
283.

Conversion of plain text into Cipher text is called as________.

A. encryption
B. decryption
C. hidden text
D. none of above
Answer» B. decryption
284.

The full form of OSI is OSI model__.

A. open systems interconnection
B. open software interconnection
C. open connection
D. open system internet
Answer» B. open software interconnection
285.

The__model is 7 layer architecture where each layer is having some specific functionality to perform.

A. tcp
B. osi
C. ois
D. none of these
Answer» C. ois
286.

__is used to create the organisation's overall security program.

A. program policy
B. purpose
C. security
D. none of these
Answer» B. purpose
287.

A way to ensure that the entity is indeed what it claims to be.-

A. authentication
B. accountability
C. identification
D. security
Answer» B. accountability
288.

Conversion of Cypher text to plain text?

A. encryption
B. decryption
C. simple text
D. none of these
Answer» C. simple text
289.

An act of protecting information from unauthorised disclouser to an entity.-

A. intergrity
B. avability
C. confidentiality
D. none of these
Answer» D. none of these
290.

Symmetric key encryption is also called as?

A. public key encryption
B. private key encryption
C. both of these
D. none of these
Answer» C. both of these
291.

A hacker guessing suggested password to a program is call as?

A. password guessing
B. dictionary attack
C. default password attack
D. none of these
Answer» D. none of these
292.

What is full form of DDoS?

A. derived denial of service
B. distributed denial of service
C. denial of service
D. none of these
Answer» C. denial of service
293.

Which One of them is Passive attack?

A. denial of service
B. modify message in transit
C. replay previous message
D. obtain message contain
Answer» E.
294.

What is lying of IP address called as?

A. ip spoofing
B. ip scamming
C. ip lying
D. none of theses
Answer» B. ip scamming
295.

Protection against Denial by one of these parties in a communication refers to?

A. non-repudiation
B. data integrity
C. authentication
D. none of these
Answer» B. data integrity
296.

Prevention of the unauthorised used of Resources refers too?

A. data integrity
B. data confidentiality
C. acess control
D. none of these
Answer» D. none of these
297.

__________ means knowledge obtained from investigation, study , intelligence new ,facts .

A. security
B. data
C. information
D. none of these
Answer» D. none of these
298.

Security Measures Needed to protect ________ during their transmission

A. file
B. data
C. packet
D. all of above
Answer» C. packet
299.

S/MIME is abbreviated as __________________

A. secure/multimedia internet mailing extensions
B. secure/multipurpose internet mailing extensions
C. secure/multimedia internet mail extensions
D. secure/multipurpose internet mail extensions
Answer» E.
300.

In SSL, what is used for authenticating a message?

A. mac (message access code)
B. mac (message authentication code)
C. mac (machine authentication code)
D. mac (machine access code)
Answer» C. mac (machine authentication code)