

MCQOPTIONS
Saved Bookmarks
This section includes 379 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
351. |
In asymmetric key cryptography, the private key is kept by __________ |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | all the connected devices to the network |
Answer» C. sender and receiver | |
352. |
What is data encryption standard (DES)? |
A. | block cipher |
B. | stream cipher |
C. | bit cipher |
D. | byte cipher |
Answer» B. stream cipher | |
353. |
In cryptography, the order of the letters in a message is rearranged by __________ |
A. | transpositional ciphers |
B. | substitution ciphers |
C. | both transpositional ciphers and substitution ciphers |
D. | quadratic ciphers |
Answer» B. substitution ciphers | |
354. |
In cryptography, what is cipher? |
A. | algorithm for performing encryption and decryption |
B. | encrypted message |
C. | both algorithm for performing encryption and decryption and encrypted message |
D. | decrypted message |
Answer» B. encrypted message | |
355. |
Which is the largest disadvantage of the symmetric Encryption? |
A. | more complex and therefore more time-consuming calculations. |
B. | problem of the secure transmission of the secret key. |
C. | less secure encryption function. |
D. | isn\t used any more. |
Answer» C. less secure encryption function. | |
356. |
Which of the following Algorithms not belong to symmetric encryption |
A. | 3des (tripledes) |
B. | rsa |
C. | rc5 |
D. | idea |
Answer» C. rc5 | |
357. |
What type of attack uses a fraudulent server with a relay address? |
A. | ntlm |
B. | mitm |
C. | netbios |
D. | smb |
Answer» C. netbios | |
358. |
The ________ is encrypted text. |
A. | a) cipher scricpt |
B. | b) cipher text |
C. | c) secret text |
D. | d) secret script |
Answer» C. c) secret text | |
359. |
Release of message contents and Traffic analysis are two types of _________ attacks. |
A. | a) active attack |
B. | b) modification of attack |
C. | c) passive attack |
D. | d) dos attack |
Answer» D. d) dos attack | |
360. |
A company requires its users to change passwords every month. This improves the ________ of the network. |
A. | a) performance |
B. | b) reliability |
C. | c) security |
D. | d) none of the above |
Answer» D. d) none of the above | |
361. |
What does OSI stand for in the OSI Security Architecure? |
A. | a) open system interface |
B. | b) open systems interconnections |
C. | c) open source initiative |
D. | d) open standard interconnections |
Answer» C. c) open source initiative | |
362. |
Data ___________ is used to ensure confidentiality. |
A. | a) encryption |
B. | b) locking |
C. | c) decryption |
D. | d) backup |
Answer» B. b) locking | |
363. |
This helps in identifying the origin of information and authentic user. This referred to here as __________ |
A. | a) confidentiality |
B. | b) integrity |
C. | c) authenticity |
D. | d) availability |
Answer» D. d) availability | |
364. |
_______ of information means, only authorized users are capable of accessing the information. |
A. | a) confidentiality |
B. | b) integrity |
C. | c) non-repudiation |
D. | d) availability |
Answer» E. | |
365. |
When you use the word ______it means you are protecting your data from getting disclosed. |
A. | a) confidentiality |
B. | b) integrity |
C. | c) authentication |
D. | d) availability |
Answer» B. b) integrity | |
366. |
_______ means the protection of data from modification by unknown users. |
A. | a) confidentiality |
B. | b) integrity |
C. | c) authentication |
D. | d) non-repudiation |
Answer» C. c) authentication | |
367. |
Related to information security, confidentiality is the opposite of which of the following? |
A. | a) closure |
B. | b) disclosure |
C. | c) disaster |
D. | d) disposal |
Answer» C. c) disaster | |
368. |
The CIA triad is often represented by which of the following? |
A. | a) triangle |
B. | b) diagonal |
C. | c) ellipse |
D. | d) circle |
Answer» B. b) diagonal | |
369. |
An attempt to harm, damage or cause threat to a system or network is broadly termed as ______ |
A. | a) cyber-crime |
B. | b) cyber attack |
C. | c) system hijacking |
D. | d) digital crime |
Answer» C. c) system hijacking | |
370. |
_______ platforms are used for safety and protection of information in the cloud. |
A. | a) cloud workload protection platforms |
B. | b) cloud security protocols |
C. | c) aws |
D. | d) one drive |
Answer» B. b) cloud security protocols | |
371. |
_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction. |
A. | a) network security |
B. | b) database security |
C. | c) information security |
D. | d) physical security |
Answer» D. d) physical security | |
372. |
Compromising confidential information comes under _________ |
A. | a) bug |
B. | b) threat |
C. | c) vulnerability |
D. | d) attack |
Answer» C. c) vulnerability | |
373. |
What are the two primary classifications of cross-site scripting? |
A. | dom based and persistent |
B. | traditional and dom based |
C. | traditional and non-persistent |
D. | non-persistent and persistent |
Answer» E. | |
374. |
What is one advantage of setting up a DMZ with two firewalls? |
A. | you can control where traffic goes in three networks |
B. | you can do stateful packet filtering |
C. | you can do load balancing |
D. | ??improved network performance |
Answer» D. ??improved network performance | |
375. |
For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset. |
A. | ticket |
B. | local |
C. | token |
D. | user |
Answer» B. local | |
376. |
The basic Web Services platform is combination of _____ and _______ |
A. | css + http |
B. | xml + html |
C. | xml + http |
D. | css + java |
Answer» D. css + java | |
377. |
For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keysâ€. |
A. | key |
B. | realm |
C. | document |
D. | none of the mentioned |
Answer» C. document | |
378. |
In the _______ mode, IPSec protects the whole IP packet, including the original IP header. |
A. | transport |
B. | tunnel |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» C. either (a) or (b) | |
379. |
The _______ mode is normally used when we need host-to-host (end-to-end) protection of data. |
A. | transport |
B. | tunnel |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» B. tunnel | |