MCQOPTIONS
Saved Bookmarks
This section includes 29 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Message ________ means privacy that the sender and reciever expect privacy. |
| A. | confidentiality |
| B. | integrity |
| C. | authentication |
| D. | Authorization |
| Answer» B. integrity | |
| 2. |
Message_____ means that the data must arrive at the reciever exactly as sent |
| A. | confidentiality |
| B. | integrity |
| C. | authentication |
| D. | Authorization |
| Answer» C. authentication | |
| 3. |
__________means that a sender must not be able to deny sending a message that he sent. |
| A. | Confidentiality |
| B. | Integrity |
| C. | Authentication |
| D. | Nonrepudiation |
| Answer» E. | |
| 4. |
Message _______ means that the receiver is ensured that the message message is coming from the indended sender not an imposter. |
| A. | confidentiality |
| B. | integrity |
| C. | authentication |
| D. | Authorization |
| Answer» D. Authorization | |
| 5. |
A(n) can be used to preserve the integrity of a document or a message. |
| A. | message digest |
| B. | message summary |
| C. | encrypted message |
| D. | ENCRYPTION |
| Answer» B. message summary | |
| 6. |
A(n) function creates a message digest out of a message. |
| A. | encryption |
| B. | decryption |
| C. | hash |
| D. | integrity |
| Answer» D. integrity | |
| 7. |
A hash function must meet criteria. |
| A. | two |
| B. | three |
| C. | four |
| D. | ten |
| Answer» C. four | |
| 8. |
_ creates a secret key only between a member and the center. |
| A. | CA |
| B. | KDC |
| C. | KDD |
| D. | CD |
| Answer» C. KDD | |
| 9. |
Password-based authentication can be divided into two broad categories: and _____ |
| A. | fixed; variable |
| B. | time-stamped; fixed |
| C. | fixed; one-time |
| D. | none of the above |
| Answer» D. none of the above | |
| 10. |
is a popular session key creator protocol that requires an authentica |
| A. | KDC |
| B. | Kerberos |
| C. | CA ion server and a ticket-granting server. |
| D. | CD |
| Answer» B. Kerberos | |
| 11. |
The secret key between members needs to be created as a ________ key when two members contact KDC. |
| A. | public |
| B. | session |
| C. | complimentary |
| D. | private |
| Answer» C. complimentary | |
| 12. |
A(n) is a hierarchical system that answers queries about key certification. |
| A. | KDC |
| B. | PKI |
| C. | CA |
| D. | CD |
| Answer» D. CD | |
| 13. |
_______________________ is a term used in cryptography that refers to a message before encryption or after decryption. |
| A. | Cipher text |
| B. | Plain text |
| C. | Plain script |
| D. | Original text |
| Answer» B. Plain text | |
| 14. |
Firewalls are to protect against |
| A. | Virus Attacks |
| B. | Fire Attacks |
| C. | Data Driven Attacks |
| D. | Unauthorized Attacks |
| Answer» E. | |
| 15. |
The ________criterion ensures that we cannot find two messages that hash to the same digest |
| A. | one-wayness |
| B. | weak-collision-resistance |
| C. | strong-collision-resistance |
| D. | Keyless |
| Answer» C. strong-collision-resistance | |
| 16. |
The ________ is encrypted text |
| A. | cipher text |
| B. | cipher scricpt |
| C. | secret text |
| D. | secret script |
| Answer» D. secret script | |
| 17. |
_______________________ ensures that information are in a format that is true and correct to its original purposes. |
| A. | Availability |
| B. | Confidentiality |
| C. | Cryptography |
| D. | Integrity |
| Answer» B. Confidentiality | |
| 18. |
_____________________ ensures that information and resources are available to those who need them. |
| A. | Availability |
| B. | Confidentiality |
| C. | Cryptography |
| D. | Integrity |
| Answer» E. | |
| 19. |
_______________________ is the process of identifying an individual, usually based on a username and password. |
| A. | Authentication |
| B. | Authorization |
| C. | integrity |
| D. | crytography |
| Answer» B. Authorization | |
| 20. |
___________________ is the process of giving individuals access to system objects based on their identity. |
| A. | Authentication |
| B. | Authorization |
| C. | key |
| D. | Confidentiality |
| Answer» C. key | |
| 21. |
In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text. |
| A. | polyalphabetic |
| B. | mono alphabetic |
| C. | Transpositional |
| D. | multialphabetic |
| Answer» C. Transpositional | |
| 22. |
________________ is a bit-oriented protocol for communication over point-to-point and multi-point links . |
| A. | Stop-and-wait |
| B. | HDLC |
| C. | Sliding window |
| D. | Go-back-N |
| Answer» B. HDLC | |
| 23. |
___________ is a type of transmission impairment in which the Signal looses strength due to The resistance of the transmission medium. |
| A. | Attenuation |
| B. | Distortion |
| C. | Noise |
| D. | Decible |
| Answer» B. Distortion | |
| 24. |
Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender. |
| A. | Broadcasting |
| B. | Unicasting |
| C. | Packet switching |
| D. | Circuit switching |
| Answer» E. | |
| 25. |
If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment. |
| A. | First |
| B. | Middle |
| C. | Last |
| D. | Four |
| Answer» B. Middle | |
| 26. |
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called : |
| A. | Strobing |
| B. | Amplification |
| C. | Conditioning |
| D. | Quantization |
| Answer» E. | |
| 27. |
Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit? |
| A. | FIN |
| B. | RST |
| C. | SYN |
| D. | PSH |
| Answer» B. RST | |
| 28. |
The Mobile Application Protocol (MAP) typically runs on top of which protocol ? |
| A. | SNMP (Simple Network Management Protocol) |
| B. | SMTP (Simple Mail Transfer Protocol) |
| C. | SS7 (Signalling System 7) |
| D. | HTTP (Hyper Text Tr |
| Answer» D. HTTP (Hyper Text Tr | |
| 29. |
Symmetric-key cryptography started thousands of years ago when people needed to exchange |
| A. | Files |
| B. | Packets |
| C. | Secrets |
| D. | Tr |
| Answer» B. Packets | |