Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

351.

In asymmetric key cryptography, the private key is kept by __________

A. sender
B. receiver
C. sender and receiver
D. all the connected devices to the network
Answer» C. sender and receiver
352.

What is data encryption standard (DES)?

A. block cipher
B. stream cipher
C. bit cipher
D. byte cipher
Answer» B. stream cipher
353.

In cryptography, the order of the letters in a message is rearranged by __________

A. transpositional ciphers
B. substitution ciphers
C. both transpositional ciphers and substitution ciphers
D. quadratic ciphers
Answer» B. substitution ciphers
354.

In cryptography, what is cipher?

A. algorithm for performing encryption and decryption
B. encrypted message
C. both algorithm for performing encryption and decryption and encrypted message
D. decrypted message
Answer» B. encrypted message
355.

Which is the largest disadvantage of the symmetric Encryption?

A. more complex and therefore more time-consuming calculations.
B. problem of the secure transmission of the secret key.
C. less secure encryption function.
D. isn\t used any more.
Answer» C. less secure encryption function.
356.

Which of the following Algorithms not belong to symmetric encryption

A. 3des (tripledes)
B. rsa
C. rc5
D. idea
Answer» C. rc5
357.

What type of attack uses a fraudulent server with a relay address?

A. ntlm
B. mitm
C. netbios
D. smb
Answer» C. netbios
358.

The ________ is encrypted text.

A. a) cipher scricpt
B. b) cipher text
C. c) secret text
D. d) secret script
Answer» C. c) secret text
359.

Release of message contents and Traffic analysis are two types of _________ attacks.

A. a) active attack
B. b) modification of attack
C. c) passive attack
D. d) dos attack
Answer» D. d) dos attack
360.

A company requires its users to change passwords every month. This improves the ________ of the network.

A. a) performance
B. b) reliability
C. c) security
D. d) none of the above
Answer» D. d) none of the above
361.

What does OSI stand for in the OSI Security Architecure?

A. a) open system interface
B. b) open systems interconnections
C. c) open source initiative
D. d) open standard interconnections
Answer» C. c) open source initiative
362.

Data ___________ is used to ensure confidentiality.

A. a) encryption
B. b) locking
C. c) decryption
D. d) backup
Answer» B. b) locking
363.

This helps in identifying the origin of information and authentic user. This referred to here as __________

A. a) confidentiality
B. b) integrity
C. c) authenticity
D. d) availability
Answer» D. d) availability
364.

_______ of information means, only authorized users are capable of accessing the information.

A. a) confidentiality
B. b) integrity
C. c) non-repudiation
D. d) availability
Answer» E.
365.

When you use the word ______it means you are protecting your data from getting disclosed.

A. a) confidentiality
B. b) integrity
C. c) authentication
D. d) availability
Answer» B. b) integrity
366.

_______ means the protection of data from modification by unknown users.

A. a) confidentiality
B. b) integrity
C. c) authentication
D. d) non-repudiation
Answer» C. c) authentication
367.

Related to information security, confidentiality is the opposite of which of the following?

A. a) closure
B. b) disclosure
C. c) disaster
D. d) disposal
Answer» C. c) disaster
368.

The CIA triad is often represented by which of the following?

A. a) triangle
B. b) diagonal
C. c) ellipse
D. d) circle
Answer» B. b) diagonal
369.

An attempt to harm, damage or cause threat to a system or network is broadly termed as ______

A. a) cyber-crime
B. b) cyber attack
C. c) system hijacking
D. d) digital crime
Answer» C. c) system hijacking
370.

_______ platforms are used for safety and protection of information in the cloud.

A. a) cloud workload protection platforms
B. b) cloud security protocols
C. c) aws
D. d) one drive
Answer» B. b) cloud security protocols
371.

_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.

A. a) network security
B. b) database security
C. c) information security
D. d) physical security
Answer» D. d) physical security
372.

Compromising confidential information comes under _________

A. a) bug
B. b) threat
C. c) vulnerability
D. d) attack
Answer» C. c) vulnerability
373.

What are the two primary classifications of cross-site scripting?

A. dom based and persistent
B. traditional and dom based
C. traditional and non-persistent
D. non-persistent and persistent
Answer» E.
374.

What is one advantage of setting up a DMZ with two firewalls?

A. you can control where traffic goes in three networks
B. you can do stateful packet filtering
C. you can do load balancing
D. ??improved network performance
Answer» D. ??improved network performance
375.

For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset.

A. ticket
B. local
C. token
D. user
Answer» B. local
376.

The basic Web Services platform is combination of _____ and _______

A. css + http
B. xml + html
C. xml + http
D. css + java
Answer» D. css + java
377.

For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keys”.

A. key
B. realm
C. document
D. none of the mentioned
Answer» C. document
378.

In the _______ mode, IPSec protects the whole IP packet, including the original IP header.

A. transport
B. tunnel
C. either (a) or (b)
D. neither (a) nor (b)
Answer» C. either (a) or (b)
379.

The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

A. transport
B. tunnel
C. either (a) or (b)
D. neither (a) nor (b)
Answer» B. tunnel