

MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
301. |
What is the key size allowed in PGP? |
A. | 1024-1056 |
B. | 1024-4056 |
C. | 1024-4096 |
D. | 1024-2048 |
Answer» D. 1024-2048 | |
302. |
ISAKMP stands for ______ |
A. | internet system association and key management packet |
B. | internet security association and key management protocol |
C. | interchange system and key modeling protocol |
D. | internet security association and key modeling protocol |
Answer» C. interchange system and key modeling protocol | |
303. |
______ was invented by Phil Zimmerman. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» D. none of the above | |
304. |
In _______, the cryptographic algorithms and secrets are sent with the message. |
A. | ipsec |
B. | ssl |
C. | tls |
D. | pgp |
Answer» E. | |
305. |
PGP makes use of which cryptographic algorithm? |
A. | des |
B. | aes |
C. | rsa |
D. | rabin |
Answer» D. rabin | |
306. |
In _____, there can be multiple paths from fully or partially trusted authorities. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» C. kdc | |
307. |
______ provides authentication at the IP level. |
A. | ah |
B. | esp |
C. | pgp |
D. | ssl |
Answer» B. esp | |
308. |
________ provides privacy, integrity, and authentication in e-mail. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» D. none of the above | |
309. |
_______ uses the idea of certificate trust levels. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» C. kdc | |
310. |
In ______, there is a single path from the fully trusted authority to any certificate. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» B. pgp | |
311. |
IKE uses _______ |
A. | oakley |
B. | skeme |
C. | isakmp |
D. | all of the above |
Answer» E. | |
312. |
SSL provides _________. |
A. | message integrity |
B. | confidentiality |
C. | compression |
D. | all of the above |
Answer» E. | |
313. |
PGP encrypts data by using a block cipher called ______ |
A. | international data encryption algorithm |
B. | private data encryption algorithm |
C. | internet data encryption algorithm |
D. | local data encryption algorithm |
Answer» B. private data encryption algorithm | |
314. |
Pretty good privacy (PGP) is used in ______ |
A. | browser security |
B. | email security |
C. | ftp security |
D. | wifi security |
Answer» C. ftp security | |
315. |
IKE creates SAs for _____. |
A. | ssl |
B. | pgp |
C. | ipsec |
D. | vp |
Answer» D. vp | |
316. |
In tunnel mode, IPSec protects the ______ |
A. | entire ip packet |
B. | ip header |
C. | ip payload |
D. | ip trailer |
Answer» B. ip header | |
317. |
There are ________ types of VPN protocols. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 6 |
Answer» E. | |
318. |
Site-to-Site VPN architecture is also known as _________ |
A. | remote connection based vpns |
B. | peer-to-peer vpns |
C. | extranet based vpn |
D. | country-to-country vpns |
Answer» D. country-to-country vpns | |
319. |
Which types of VPNs are used for corporate connectivity across companies residing in different geographical location? |
A. | remote access vpns |
B. | site-to-site vpns |
C. | peer-to-peer vpns |
D. | country-to-country vpns |
Answer» C. peer-to-peer vpns | |
320. |
_________ type of VPNs are used for home private and secure connectivity. |
A. | remote access vpns |
B. | site-to-site vpns |
C. | peer-to-peer vpns |
D. | router-to-router vpns |
Answer» B. site-to-site vpns | |
321. |
There are _________ types of VPNs. |
A. | 3 |
B. | 2 |
C. | 5 |
D. | 4 |
Answer» C. 5 | |
322. |
VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network. |
A. | true |
B. | false |
Answer» B. false | |
323. |
What types of protocols are used in VPNs? |
A. | application level protocols |
B. | tunnelling protocols |
C. | network protocols |
D. | mailing protocols |
Answer» B. tunnelling protocols | |
324. |
Which of the statements are not true to classify VPN systems? |
A. | protocols used for tunnelling the traffic |
B. | whether vpns are providing site-to-site or remote access connection |
C. | securing the network from bots and malwares |
D. | levels of security provided for sending and receiving data privately |
Answer» D. levels of security provided for sending and receiving data privately | |
325. |
__________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network. |
A. | visual private network |
B. | virtual protocol network |
C. | virtual protocol networking |
D. | virtual private network |
Answer» E. | |
326. |
1. VPN is abbreviated as __________ |
A. | visual private network |
B. | virtual protocol network |
C. | virtual private network |
D. | virtual protocol networking |
Answer» D. virtual protocol networking | |
327. |
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other. |
A. | man-in-the-middle |
B. | ciphertext attack |
C. | plaintext attack |
D. | none of the above |
Answer» B. ciphertext attack | |
328. |
he ________ method provides a one-time session key for two parties. |
A. | diffie-hellman |
B. | rsa |
C. | des |
D. | aes |
Answer» B. rsa | |
329. |
In the handshake protocol which is the message type first sent between client and server ? |
A. | server_hello |
B. | client_hello |
C. | hello_request |
D. | certificate_request |
Answer» C. hello_request | |
330. |
One commonly used public-key cryptography method is the ______ algorithm. |
A. | rss |
B. | ras |
C. | rsa |
D. | raa |
Answer» D. raa | |
331. |
The DSS signature uses which hash algorithm? |
A. | md5 |
B. | sha-2 |
C. | sha-1 |
D. | does not use hash algorithm |
Answer» D. does not use hash algorithm | |
332. |
The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key. |
A. | true |
B. | false |
Answer» C. | |
333. |
What is the size of the RSA signature hash after the MD5 and SHA-1 processing? |
A. | 42 bytes |
B. | 32 bytes |
C. | 36 bytes |
D. | 48 bytes |
Answer» D. 48 bytes | |
334. |
Message authentication code is also known as |
A. | key code |
B. | hash code |
C. | keyed hash function |
D. | message key hash function |
Answer» C. keyed hash function | |
335. |
When a hash function is used to provide message authentication, the hash function value is referred to as |
A. | message field |
B. | message digest |
C. | message score |
D. | message leap |
Answer» E. | |
336. |
ECC stands for |
A. | elliptic curve cryptography |
B. | enhanced curve cryptography |
C. | elliptic cone cryptography |
D. | eclipse curve cryptography |
Answer» B. enhanced curve cryptography | |
337. |
“Elliptic curve cryptography follows the associative property.†|
A. | true |
B. | false |
Answer» B. false | |
338. |
Extensions to the X.509 certificates were added in version ____ |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» D. 4 | |
339. |
A digital signature needs ____ system |
A. | symmetric-key |
B. | asymmetric-key |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» C. either (a) or (b) | |
340. |
________function creates a message digest out of a message. |
A. | encryption |
B. | decryption |
C. | hash |
D. | none of the above |
Answer» D. none of the above | |
341. |
ECC encryption system is __________ |
A. | symmetric key encryption algorithm |
B. | asymmetric key encryption algorithm |
C. | not an encryption algorithm |
D. | block cipher method |
Answer» C. not an encryption algorithm | |
342. |
How many rounds does the AES-192 perform? |
A. | 10 |
B. | 12 |
C. | 14 |
D. | 16 |
Answer» C. 14 | |
343. |
The procedure to add bits to the last block is termed as _________________ |
A. | decryption |
B. | hashing |
C. | tuning |
D. | padding |
Answer» E. | |
344. |
Conventional cryptography is also known as _____________ or symmetric-key encryption. |
A. | secret-key |
B. | public key |
C. | protected key |
D. | primary key |
Answer» B. public key | |
345. |
4. Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data. |
A. | secret key |
B. | external programs |
C. | add-ons |
D. | secondary key |
Answer» B. external programs | |
346. |
______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it. |
A. | malware analysis |
B. | cryptography |
C. | reverse engineering |
D. | exploit writing |
Answer» C. reverse engineering | |
347. |
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. |
A. | malware analysis |
B. | exploit writing |
C. | reverse engineering |
D. | cryptography |
Answer» E. | |
348. |
In asymmetric key cryptography, the two keys e and d, have special relationship to |
A. | others |
B. | data |
C. | keys |
D. | each other |
Answer» E. | |
349. |
A asymmetric-key (or public key ) cipher uses |
A. | 1 key |
B. | 2 key |
C. | 3 key |
D. | 4 key |
Answer» C. 3 key | |
350. |
Which one of the following algorithm is not used in asymmetric-key cryptography? |
A. | rsa algorithm |
B. | diffie-hellman algorithm |
C. | electronic code book algorithm |
D. | dsa algorithm |
Answer» D. dsa algorithm | |