MCQOPTIONS
Saved Bookmarks
This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
The length of the key in one time pad method is .................... |
| A. | Random |
| B. | Fixed |
| C. | 64 |
| D. | 56 |
| Answer» B. Fixed | |
| 2. |
Which one of the following is correct ? |
| A. | Character - represented by One’s Complement |
| B. | Character - represented by Two’s Complement |
| C. | Integer - represented by ASCII |
| D. | Character - represented by Unicode |
| Answer» E. | |
| 3. |
The type of encoding in which manipulation of bit streams without regard to what the bits mean is ..................... |
| A. | Destination encoding |
| B. | Entropy encoding |
| C. | Source encoding |
| D. | Differential encoding |
| Answer» C. Source encoding | |
| 4. |
The art of breaking ciphers is known as: |
| A. | cryptology |
| B. | cryptography |
| C. | cryptanalysis |
| D. | crypting |
| Answer» D. crypting | |
| 5. |
Number of S - boxes used in DES algorithm is ............... |
| A. | 4 |
| B. | 8 |
| C. | 16 |
| D. | 32 |
| Answer» C. 16 | |
| 6. |
The number of subkeys generated in IDEA algorithm are ................. |
| A. | 54 |
| B. | 48 |
| C. | 52 |
| D. | 50 |
| Answer» D. 50 | |
| 7. |
The ................... portion of LAN management software restricts access, records user activities and audit data etc. |
| A. | Configuration management |
| B. | Security management |
| C. | Performance management |
| D. | None of these |
| Answer» C. Performance management | |
| 8. |
IN_ASYMMETRIC_ENCRYPTION?$ |
| A. | same key is used for encryption and decryption |
| B. | different keys are used encryption and decryption |
| C. | no key is required for encryption and decryption |
| D. | none of the mentioned |
| Answer» C. no key is required for encryption and decryption | |
| 9. |
PGP_ENCRYPTS_DATA_BY_USING_A_BLOCK_CIPHER_CALLED?$ |
| A. | international data encryption algorithm |
| B. | private data encryption algorithm |
| C. | intrenet data encryption algorithm |
| D. | none of the mentioned |
| Answer» B. private data encryption algorithm | |
| 10. |
Multipartite viruses attack o? |
| A. | files |
| B. | boot sector |
| C. | memory |
| D. | all of the mentioned |
| Answer» E. | |
| 11. |
Pretty good privacy (PGP) is used i? |
| A. | browser security |
| B. | email security |
| C. | FTP security |
| D. | none of the mentioned |
| Answer» C. FTP security | |