

MCQOPTIONS
Saved Bookmarks
This section includes 29 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.
1. |
Message ________ means privacy that the sender and reciever expect privacy. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | Authorization |
Answer» B. integrity | |
2. |
Message_____ means that the data must arrive at the reciever exactly as sent |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | Authorization |
Answer» C. authentication | |
3. |
__________means that a sender must not be able to deny sending a message that he sent. |
A. | Confidentiality |
B. | Integrity |
C. | Authentication |
D. | Nonrepudiation |
Answer» E. | |
4. |
Message _______ means that the receiver is ensured that the message message is coming from the indended sender not an imposter. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | Authorization |
Answer» D. Authorization | |
5. |
A(n) can be used to preserve the integrity of a document or a message. |
A. | message digest |
B. | message summary |
C. | encrypted message |
D. | ENCRYPTION |
Answer» B. message summary | |
6. |
A(n) function creates a message digest out of a message. |
A. | encryption |
B. | decryption |
C. | hash |
D. | integrity |
Answer» D. integrity | |
7. |
A hash function must meet criteria. |
A. | two |
B. | three |
C. | four |
D. | ten |
Answer» C. four | |
8. |
_ creates a secret key only between a member and the center. |
A. | CA |
B. | KDC |
C. | KDD |
D. | CD |
Answer» C. KDD | |
9. |
Password-based authentication can be divided into two broad categories: and _____ |
A. | fixed; variable |
B. | time-stamped; fixed |
C. | fixed; one-time |
D. | none of the above |
Answer» D. none of the above | |
10. |
is a popular session key creator protocol that requires an authentica |
A. | KDC |
B. | Kerberos |
C. | CA ion server and a ticket-granting server. |
D. | CD |
Answer» B. Kerberos | |
11. |
The secret key between members needs to be created as a ________ key when two members contact KDC. |
A. | public |
B. | session |
C. | complimentary |
D. | private |
Answer» C. complimentary | |
12. |
A(n) is a hierarchical system that answers queries about key certification. |
A. | KDC |
B. | PKI |
C. | CA |
D. | CD |
Answer» D. CD | |
13. |
_______________________ is a term used in cryptography that refers to a message before encryption or after decryption. |
A. | Cipher text |
B. | Plain text |
C. | Plain script |
D. | Original text |
Answer» B. Plain text | |
14. |
Firewalls are to protect against |
A. | Virus Attacks |
B. | Fire Attacks |
C. | Data Driven Attacks |
D. | Unauthorized Attacks |
Answer» E. | |
15. |
The ________criterion ensures that we cannot find two messages that hash to the same digest |
A. | one-wayness |
B. | weak-collision-resistance |
C. | strong-collision-resistance |
D. | Keyless |
Answer» C. strong-collision-resistance | |
16. |
The ________ is encrypted text |
A. | cipher text |
B. | cipher scricpt |
C. | secret text |
D. | secret script |
Answer» D. secret script | |
17. |
_______________________ ensures that information are in a format that is true and correct to its original purposes. |
A. | Availability |
B. | Confidentiality |
C. | Cryptography |
D. | Integrity |
Answer» B. Confidentiality | |
18. |
_____________________ ensures that information and resources are available to those who need them. |
A. | Availability |
B. | Confidentiality |
C. | Cryptography |
D. | Integrity |
Answer» E. | |
19. |
_______________________ is the process of identifying an individual, usually based on a username and password. |
A. | Authentication |
B. | Authorization |
C. | integrity |
D. | crytography |
Answer» B. Authorization | |
20. |
___________________ is the process of giving individuals access to system objects based on their identity. |
A. | Authentication |
B. | Authorization |
C. | key |
D. | Confidentiality |
Answer» C. key | |
21. |
In substitution, a character in the plaintext is always changed to the same character in the ciphertext, regardless of its position in the text. |
A. | polyalphabetic |
B. | mono alphabetic |
C. | Transpositional |
D. | multialphabetic |
Answer» C. Transpositional | |
22. |
________________ is a bit-oriented protocol for communication over point-to-point and multi-point links . |
A. | Stop-and-wait |
B. | HDLC |
C. | Sliding window |
D. | Go-back-N |
Answer» B. HDLC | |
23. |
___________ is a type of transmission impairment in which the Signal looses strength due to The resistance of the transmission medium. |
A. | Attenuation |
B. | Distortion |
C. | Noise |
D. | Decible |
Answer» B. Distortion | |
24. |
Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender. |
A. | Broadcasting |
B. | Unicasting |
C. | Packet switching |
D. | Circuit switching |
Answer» E. | |
25. |
If a packet arrive with an M-bit value is '1' and a fragmentation offset value '0', then it is ______ fragment. |
A. | First |
B. | Middle |
C. | Last |
D. | Four |
Answer» B. Middle | |
26. |
The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude, is called : |
A. | Strobing |
B. | Amplification |
C. | Conditioning |
D. | Quantization |
Answer» E. | |
27. |
Which of the following control fields in TCP header is used to specify whether the sender has no more data to transmit? |
A. | FIN |
B. | RST |
C. | SYN |
D. | PSH |
Answer» B. RST | |
28. |
The Mobile Application Protocol (MAP) typically runs on top of which protocol ? |
A. | SNMP (Simple Network Management Protocol) |
B. | SMTP (Simple Mail Transfer Protocol) |
C. | SS7 (Signalling System 7) |
D. | HTTP (Hyper Text Tr |
Answer» D. HTTP (Hyper Text Tr | |
29. |
Symmetric-key cryptography started thousands of years ago when people needed to exchange |
A. | Files |
B. | Packets |
C. | Secrets |
D. | Tr |
Answer» B. Packets | |