Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

301.

What is the key size allowed in PGP?

A. 1024-1056
B. 1024-4056
C. 1024-4096
D. 1024-2048
Answer» D. 1024-2048
302.

ISAKMP stands for ______

A. internet system association and key management packet
B. internet security association and key management protocol
C. interchange system and key modeling protocol
D. internet security association and key modeling protocol
Answer» C. interchange system and key modeling protocol
303.

______ was invented by Phil Zimmerman.

A. ipsec
B. ssl
C. pgp
D. none of the above
Answer» D. none of the above
304.

In _______, the cryptographic algorithms and secrets are sent with the message.

A. ipsec
B. ssl
C. tls
D. pgp
Answer» E.
305.

PGP makes use of which cryptographic algorithm?

A. des
B. aes
C. rsa
D. rabin
Answer» D. rabin
306.

In _____, there can be multiple paths from fully or partially trusted authorities.

A. x509
B. pgp
C. kdc
D. none of the above
Answer» C. kdc
307.

______ provides authentication at the IP level.

A. ah
B. esp
C. pgp
D. ssl
Answer» B. esp
308.

________ provides privacy, integrity, and authentication in e-mail.

A. ipsec
B. ssl
C. pgp
D. none of the above
Answer» D. none of the above
309.

_______ uses the idea of certificate trust levels.

A. x509
B. pgp
C. kdc
D. none of the above
Answer» C. kdc
310.

In ______, there is a single path from the fully trusted authority to any certificate.

A. x509
B. pgp
C. kdc
D. none of the above
Answer» B. pgp
311.

IKE uses _______

A. oakley
B. skeme
C. isakmp
D. all of the above
Answer» E.
312.

SSL provides _________.

A. message integrity
B. confidentiality
C. compression
D. all of the above
Answer» E.
313.

PGP encrypts data by using a block cipher called ______

A. international data encryption algorithm
B. private data encryption algorithm
C. internet data encryption algorithm
D. local data encryption algorithm
Answer» B. private data encryption algorithm
314.

Pretty good privacy (PGP) is used in ______

A. browser security
B. email security
C. ftp security
D. wifi security
Answer» C. ftp security
315.

IKE creates SAs for _____.

A. ssl
B. pgp
C. ipsec
D. vp
Answer» D. vp
316.

In tunnel mode, IPSec protects the ______

A. entire ip packet
B. ip header
C. ip payload
D. ip trailer
Answer» B. ip header
317.

There are ________ types of VPN protocols.

A. 3
B. 4
C. 5
D. 6
Answer» E.
318.

Site-to-Site VPN architecture is also known as _________

A. remote connection based vpns
B. peer-to-peer vpns
C. extranet based vpn
D. country-to-country vpns
Answer» D. country-to-country vpns
319.

Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?

A. remote access vpns
B. site-to-site vpns
C. peer-to-peer vpns
D. country-to-country vpns
Answer» C. peer-to-peer vpns
320.

_________ type of VPNs are used for home private and secure connectivity.

A. remote access vpns
B. site-to-site vpns
C. peer-to-peer vpns
D. router-to-router vpns
Answer» B. site-to-site vpns
321.

There are _________ types of VPNs.

A. 3
B. 2
C. 5
D. 4
Answer» C. 5
322.

VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.

A. true
B. false
Answer» B. false
323.

What types of protocols are used in VPNs?

A. application level protocols
B. tunnelling protocols
C. network protocols
D. mailing protocols
Answer» B. tunnelling protocols
324.

Which of the statements are not true to classify VPN systems?

A. protocols used for tunnelling the traffic
B. whether vpns are providing site-to-site or remote access connection
C. securing the network from bots and malwares
D. levels of security provided for sending and receiving data privately
Answer» D. levels of security provided for sending and receiving data privately
325.

__________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network.

A. visual private network
B. virtual protocol network
C. virtual protocol networking
D. virtual private network
Answer» E.
326.

1. VPN is abbreviated as __________

A. visual private network
B. virtual protocol network
C. virtual private network
D. virtual protocol networking
Answer» D. virtual protocol networking
327.

The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.

A. man-in-the-middle
B. ciphertext attack
C. plaintext attack
D. none of the above
Answer» B. ciphertext attack
328.

he ________ method provides a one-time session key for two parties.

A. diffie-hellman
B. rsa
C. des
D. aes
Answer» B. rsa
329.

In the handshake protocol which is the message type first sent between client and server ?

A. server_hello
B. client_hello
C. hello_request
D. certificate_request
Answer» C. hello_request
330.

One commonly used public-key cryptography method is the ______ algorithm.

A. rss
B. ras
C. rsa
D. raa
Answer» D. raa
331.

The DSS signature uses which hash algorithm?

A. md5
B. sha-2
C. sha-1
D. does not use hash algorithm
Answer» D. does not use hash algorithm
332.

The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.

A. true
B. false
Answer» C.
333.

What is the size of the RSA signature hash after the MD5 and SHA-1 processing?

A. 42 bytes
B. 32 bytes
C. 36 bytes
D. 48 bytes
Answer» D. 48 bytes
334.

Message authentication code is also known as

A. key code
B. hash code
C. keyed hash function
D. message key hash function
Answer» C. keyed hash function
335.

When a hash function is used to provide message authentication, the hash function value is referred to as

A. message field
B. message digest
C. message score
D. message leap
Answer» E.
336.

ECC stands for

A. elliptic curve cryptography
B. enhanced curve cryptography
C. elliptic cone cryptography
D. eclipse curve cryptography
Answer» B. enhanced curve cryptography
337.

“Elliptic curve cryptography follows the associative property.”

A. true
B. false
Answer» B. false
338.

Extensions to the X.509 certificates were added in version ____

A. 1
B. 2
C. 3
D. 4
Answer» D. 4
339.

A digital signature needs ____ system

A. symmetric-key
B. asymmetric-key
C. either (a) or (b)
D. neither (a) nor (b)
Answer» C. either (a) or (b)
340.

________function creates a message digest out of a message.

A. encryption
B. decryption
C. hash
D. none of the above
Answer» D. none of the above
341.

ECC encryption system is __________

A. symmetric key encryption algorithm
B. asymmetric key encryption algorithm
C. not an encryption algorithm
D. block cipher method
Answer» C. not an encryption algorithm
342.

How many rounds does the AES-192 perform?

A. 10
B. 12
C. 14
D. 16
Answer» C. 14
343.

The procedure to add bits to the last block is termed as _________________

A. decryption
B. hashing
C. tuning
D. padding
Answer» E.
344.

Conventional cryptography is also known as _____________ or symmetric-key encryption.

A. secret-key
B. public key
C. protected key
D. primary key
Answer» B. public key
345.

4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data.

A. secret key
B. external programs
C. add-ons
D. secondary key
Answer» B. external programs
346.

______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

A. malware analysis
B. cryptography
C. reverse engineering
D. exploit writing
Answer» C. reverse engineering
347.

_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

A. malware analysis
B. exploit writing
C. reverse engineering
D. cryptography
Answer» E.
348.

In asymmetric key cryptography, the two keys e and d, have special relationship to

A. others
B. data
C. keys
D. each other
Answer» E.
349.

A asymmetric-key (or public key ) cipher uses

A. 1 key
B. 2 key
C. 3 key
D. 4 key
Answer» C. 3 key
350.

Which one of the following algorithm is not used in asymmetric-key cryptography?

A. rsa algorithm
B. diffie-hellman algorithm
C. electronic code book algorithm
D. dsa algorithm
Answer» D. dsa algorithm