

MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
251. |
TSL (Transport Layer Security) is a cryptographic protocol used for securing HTTP/HTTPS based connection. |
A. | true |
B. | false |
Answer» B. false | |
252. |
length of the IPv4 address is .... |
A. | 32 bits |
B. | 64 bits |
C. | 16 bits |
D. | 128 bit |
Answer» B. 64 bits | |
253. |
Which of the following is not a strong security protocol |
A. | ssl |
B. | httpl |
C. | smtp |
D. | sftp |
Answer» D. sftp | |
254. |
WPA2 is used for security in _______ |
A. | ethernet |
B. | wi-fi |
C. | bluetooth |
D. | |
Answer» C. bluetooth | |
255. |
__________ is used for encrypting data at network level |
A. | ipsec |
B. | https |
C. | smtp |
D. | s/mime |
Answer» B. https | |
256. |
SSL primarily focuses on _______ |
A. | integrity and authenticity |
B. | integrity and non-repudiation |
C. | authenticity and privacy |
D. | confidentiality and integrity |
Answer» B. integrity and non-repudiation | |
257. |
An attempt to make a computer resource unavailable to its intended users is called ______ |
A. | denial-of-service attack |
B. | virus attack |
C. | worms attack |
D. | botnet process |
Answer» B. virus attack | |
258. |
HTTPS is abbreviated as _________ |
A. | hypertexts transfer protocol secured |
B. | secured hyper text transfer protocol |
C. | hyperlinked text transfer protocol secured |
D. | hyper text transfer protocol secure |
Answer» E. | |
259. |
RSA algorithm is best example of_______ |
A. | asymmetric key cryptography |
B. | symmetric key cryptography |
C. | elliptic curve cryptography |
D. | all of the above |
Answer» B. symmetric key cryptography | |
260. |
Hash function is used for________ |
A. | message authentication |
B. | digital signature |
C. | both a and b |
D. | only a |
Answer» D. only a | |
261. |
Diffie-Hellman algorithm is widely known as_________ |
A. | key exchange algorithm |
B. | key agreement algorithm |
C. | only a |
D. | both a and b |
Answer» E. | |
262. |
Public key cryptography also called as________ |
A. | asymmetric key cryptography |
B. | symmetric key cryptography |
C. | both a and b |
D. | none of the above |
Answer» B. symmetric key cryptography | |
263. |
USENET falls under which category of public key sharing? |
A. | public announcement |
B. | publicly available directory |
C. | public key authority |
D. | public key certificate |
Answer» B. publicly available directory | |
264. |
RSA is also a stream cipher like Merkel-Hellman. |
A. | true |
B. | false |
Answer» B. false | |
265. |
In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n). |
A. | true |
B. | false |
Answer» C. | |
266. |
In RSA, Ф(n) = _______ in terms of p and q. |
A. | Â (p)/(q) |
B. | Â (p)(q) |
C. | (p-1)(q-1) |
D. | Â (p+1)(q+1) |
Answer» D. Â (p+1)(q+1) | |
267. |
For RSA to work, the value of P must be less than the value of |
A. | p |
B. | q |
C. | n |
D. | r |
Answer» D. r | |
268. |
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to |
A. | other |
B. | data |
C. | keys |
D. | each other |
Answer» E. | |
269. |
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is |
A. | short |
B. | flat |
C. | long |
D. | thin |
Answer» D. thin | |
270. |
In cryptography the original message before being transform is called |
A. | simple text |
B. | plain text |
C. | empty text |
D. | filled text |
Answer» C. empty text | |
271. |
__is the practice of concealing a message within another message,image or file. |
A. | steganography |
B. | cryptography |
C. | cipher |
D. | receiver |
Answer» B. cryptography | |
272. |
The__is a polygraphic substitution cipher based on linear algebra. |
A. | hill cipher |
B. | playfair cipher |
C. | affine cipher |
D. | none of these |
Answer» B. playfair cipher | |
273. |
An asymmetric-key (or public-key) cipher uses |
A. | 1 key |
B. | 2 key |
C. | 3 key |
D. | 4 key |
Answer» B. 2 key | |
274. |
The message which is not understandable is called as? |
A. | cipher text |
B. | plain text |
C. | hidden text |
D. | both a & c |
Answer» B. plain text | |
275. |
In AES in which Round Subkeys are Generated from Original key for each round? |
A. | key expansion |
B. | initial round |
C. | finale round |
D. | none of these |
Answer» B. initial round | |
276. |
Which of them is type of Cipher? |
A. | stream cipher |
B. | block cipher |
C. | both of them |
D. | none of these |
Answer» D. none of these | |
277. |
AES stands for? |
A. | authorized encryption standard |
B. | advance encryption standard |
C. | advance encryption strategy |
D. | none of these |
Answer» C. advance encryption strategy | |
278. |
What is the 4th step in DES Algorithm? |
A. | key transformation |
B. | s-box substitution |
C. | p-box permutation |
D. | expansion permutation |
Answer» D. expansion permutation | |
279. |
In DES step both LPT and RPT undergoes in how much key Rounds? |
A. | 8 |
B. | 16 |
C. | 32 |
D. | 64 |
Answer» C. 32 | |
280. |
Blum Blum Shub Generator is based on which Algorithm? |
A. | private key |
B. | public key |
C. | both a & b |
D. | none of these |
Answer» C. both a & b | |
281. |
In Symmetric schemes requires both parties to share how many secret key? |
A. | one |
B. | two |
C. | three |
D. | four |
Answer» B. two | |
282. |
The technique in which when one character is replaced by another Character is called as? |
A. | transposition |
B. | substitution |
C. | combinational |
D. | none of these |
Answer» C. combinational | |
283. |
Conversion of plain text into Cipher text is called as________. |
A. | encryption |
B. | decryption |
C. | hidden text |
D. | none of above |
Answer» B. decryption | |
284. |
The full form of OSI is OSI model__. |
A. | open systems interconnection |
B. | open software interconnection |
C. | open connection |
D. | open system internet |
Answer» B. open software interconnection | |
285. |
The__model is 7 layer architecture where each layer is having some specific functionality to perform. |
A. | tcp |
B. | osi |
C. | ois |
D. | none of these |
Answer» C. ois | |
286. |
__is used to create the organisation's overall security program. |
A. | program policy |
B. | purpose |
C. | security |
D. | none of these |
Answer» B. purpose | |
287. |
A way to ensure that the entity is indeed what it claims to be.- |
A. | authentication |
B. | accountability |
C. | identification |
D. | security |
Answer» B. accountability | |
288. |
Conversion of Cypher text to plain text? |
A. | encryption |
B. | decryption |
C. | simple text |
D. | none of these |
Answer» C. simple text | |
289. |
An act of protecting information from unauthorised disclouser to an entity.- |
A. | intergrity |
B. | avability |
C. | confidentiality |
D. | none of these |
Answer» D. none of these | |
290. |
Symmetric key encryption is also called as? |
A. | public key encryption |
B. | private key encryption |
C. | both of these |
D. | none of these |
Answer» C. both of these | |
291. |
A hacker guessing suggested password to a program is call as? |
A. | password guessing |
B. | dictionary attack |
C. | default password attack |
D. | none of these |
Answer» D. none of these | |
292. |
What is full form of DDoS? |
A. | derived denial of service |
B. | distributed denial of service |
C. | denial of service |
D. | none of these |
Answer» C. denial of service | |
293. |
Which One of them is Passive attack? |
A. | denial of service |
B. | modify message in transit |
C. | replay previous message |
D. | obtain message contain |
Answer» E. | |
294. |
What is lying of IP address called as? |
A. | ip spoofing |
B. | ip scamming |
C. | ip lying |
D. | none of theses |
Answer» B. ip scamming | |
295. |
Protection against Denial by one of these parties in a communication refers to? |
A. | non-repudiation |
B. | data integrity |
C. | authentication |
D. | none of these |
Answer» B. data integrity | |
296. |
Prevention of the unauthorised used of Resources refers too? |
A. | data integrity |
B. | data confidentiality |
C. | acess control |
D. | none of these |
Answer» D. none of these | |
297. |
__________ means knowledge obtained from investigation, study , intelligence new ,facts . |
A. | security |
B. | data |
C. | information |
D. | none of these |
Answer» D. none of these | |
298. |
Security Measures Needed to protect ________ during their transmission |
A. | file |
B. | data |
C. | packet |
D. | all of above |
Answer» C. packet | |
299. |
S/MIME is abbreviated as __________________ |
A. | secure/multimedia internet mailing extensions |
B. | secure/multipurpose internet mailing extensions |
C. | secure/multimedia internet mail extensions |
D. | secure/multipurpose internet mail extensions |
Answer» E. | |
300. |
In SSL, what is used for authenticating a message? |
A. | mac (message access code) |
B. | mac (message authentication code) |
C. | mac (machine authentication code) |
D. | mac (machine access code) |
Answer» C. mac (machine authentication code) | |