Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

The length of the key in one time pad method is ....................

A. Random
B. Fixed
C. 64
D. 56
Answer» B. Fixed
2.

Which one of the following is correct ?

A. Character - represented by One’s Complement
B. Character - represented by Two’s Complement
C. Integer - represented by ASCII
D. Character - represented by Unicode
Answer» E.
3.

The type of encoding in which manipulation of bit streams without regard to what the bits mean is .....................

A. Destination encoding
B. Entropy encoding
C. Source encoding
D. Differential encoding
Answer» C. Source encoding
4.

The art of breaking ciphers is known as:

A. cryptology
B. cryptography
C. cryptanalysis
D. crypting
Answer» D. crypting
5.

Number of S - boxes used in DES algorithm is ...............

A. 4
B. 8
C. 16
D. 32
Answer» C. 16
6.

The number of subkeys generated in IDEA algorithm are .................

A. 54
B. 48
C. 52
D. 50
Answer» D. 50
7.

The ................... portion of LAN management software restricts access, records user activities and audit data etc.

A. Configuration management
B. Security management
C. Performance management
D. None of these
Answer» C. Performance management
8.

IN_ASYMMETRIC_ENCRYPTION?$

A. same key is used for encryption and decryption
B. different keys are used encryption and decryption
C. no key is required for encryption and decryption
D. none of the mentioned
Answer» C. no key is required for encryption and decryption
9.

PGP_ENCRYPTS_DATA_BY_USING_A_BLOCK_CIPHER_CALLED?$

A. international data encryption algorithm
B. private data encryption algorithm
C. intrenet data encryption algorithm
D. none of the mentioned
Answer» B. private data encryption algorithm
10.

Multipartite viruses attack o?

A. files
B. boot sector
C. memory
D. all of the mentioned
Answer» E.
11.

Pretty good privacy (PGP) is used i?

A. browser security
B. email security
C. FTP security
D. none of the mentioned
Answer» C. FTP security