Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 29 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

1.

Message ________ means privacy that the sender and reciever expect privacy.

A. confidentiality
B. integrity
C. authentication
D. Authorization
Answer» B. integrity
2.

Message_____ means that the data must arrive at the reciever exactly as sent

A. confidentiality
B. integrity
C. authentication
D. Authorization
Answer» C. authentication
3.

__________means that a sender must not be able to deny sending a message that he sent.

A. Confidentiality
B. Integrity
C. Authentication
D. Nonrepudiation
Answer» E.
4.

Message _______ means that the receiver is ensured that the message message is coming from the indended sender not an imposter.

A. confidentiality
B. integrity
C. authentication
D. Authorization
Answer» D. Authorization
5.

A(n) can be used to preserve the integrity of a document or a message.

A. message digest
B. message summary
C. encrypted message
D. ENCRYPTION
Answer» B. message summary
6.

A(n) function creates a message digest out of a message.

A. encryption
B. decryption
C. hash
D. integrity
Answer» D. integrity
7.

A hash function must meet criteria.

A. two
B. three
C. four
D. ten
Answer» C. four
8.

_ creates a secret key only between a member and the center.

A. CA
B. KDC
C. KDD
D. CD
Answer» C. KDD
9.

Password-based authentication can be divided into two broad categories: and _____

A. fixed; variable
B. time-stamped; fixed
C. fixed; one-time
D. none of the above
Answer» D. none of the above
10.

is a popular session key creator protocol that requires an authentica

A. KDC
B. Kerberos
C. CA ion server and a ticket-granting server.
D. CD
Answer» B. Kerberos
11.

The secret key between members needs to be created as a ________ key when two members contact KDC.

A. public
B. session
C. complimentary
D. private
Answer» C. complimentary
12.

A(n) is a hierarchical system that answers queries about key certification.

A. KDC
B. PKI
C. CA
D. CD
Answer» D. CD
13.

_______________________ is a term used in cryptography that refers to a message before encryption or after decryption.

A. Cipher text
B. Plain text
C. Plain script
D. Original text
Answer» B. Plain text
14.

Firewalls are to protect against

A. Virus Attacks
B. Fire Attacks
C. Data Driven Attacks
D. Unauthorized Attacks
Answer» E.
15.

The ________criterion ensures that we cannot find two messages that hash to the same digest

A. one-wayness
B. weak-collision-resistance
C. strong-collision-resistance
D. Keyless
Answer» C. strong-collision-resistance
16.

The ________ is encrypted text

A. cipher text
B. cipher scricpt
C. secret text
D. secret script
Answer» D. secret script
17.

_______________________ ensures that information are in a format that is true and correct to its original purposes.

A. Availability
B. Confidentiality
C. Cryptography
D. Integrity
Answer» B. Confidentiality
18.

_____________________ ensures that information and resources are available to those who need them.

A. Availability
B. Confidentiality
C. Cryptography
D. Integrity
Answer» E.
19.

_______________________ is the process of identifying an individual, usually based on a username and password.

A. Authentication
B. Authorization
C. integrity
D. crytography
Answer» B. Authorization
20.

___________________ is the process of giving individuals access to system objects based on their identity.

A. Authentication
B. Authorization
C. key
D. Confidentiality
Answer» C. key
21.

In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text.

A. polyalphabetic
B. mono alphabetic
C. Transpositional
D. multialphabetic
Answer» C. Transpositional
22.

________________ is a bit-oriented protocol for communication over point-to-point and multi-point links .

A. Stop-and-wait
B. HDLC
C. Sliding window
D. Go-back-N
Answer» B. HDLC
23.

___________ is a type of transmission impairment in which the Signal looses strength due to The resistance of the transmission medium.

A. Attenuation
B. Distortion
C. Noise
D. Decible
Answer» B. Distortion
24.

Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender.

A. Broadcasting
B. Unicasting
C. Packet switching
D. Circuit switching
Answer» E.
25.

If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment.

A. First
B. Middle
C. Last
D. Four
Answer» B. Middle
26.

The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called :

A. Strobing
B. Amplification
C. Conditioning
D. Quantization
Answer» E.
27.

Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit?

A. FIN
B. RST
C. SYN
D. PSH
Answer» B. RST
28.

The Mobile Application Protocol (MAP) typically runs on top of which protocol ?

A. SNMP (Simple Network Management Protocol)
B. SMTP (Simple Mail Transfer Protocol)
C. SS7 (Signalling System 7)
D. HTTP (Hyper Text Tr
Answer» D. HTTP (Hyper Text Tr
29.

Symmetric-key cryptography started thousands of years ago when people needed to exchange

A. Files
B. Packets
C. Secrets
D. Tr
Answer» B. Packets