MCQOPTIONS
Saved Bookmarks
This section includes 411 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System knowledge and support exam preparation. Choose a topic below to get started.
| 401. |
The length of the key in one time pad method is .................... |
| A. | Random |
| B. | Fixed |
| C. | 64 |
| D. | 56 |
| Answer» B. Fixed | |
| 402. |
Which one of the following is correct ? |
| A. | Character - represented by One’s Complement |
| B. | Character - represented by Two’s Complement |
| C. | Integer - represented by ASCII |
| D. | Character - represented by Unicode |
| Answer» E. | |
| 403. |
The type of encoding in which manipulation of bit streams without regard to what the bits mean is ..................... |
| A. | Destination encoding |
| B. | Entropy encoding |
| C. | Source encoding |
| D. | Differential encoding |
| Answer» C. Source encoding | |
| 404. |
The art of breaking ciphers is known as: |
| A. | cryptology |
| B. | cryptography |
| C. | cryptanalysis |
| D. | crypting |
| Answer» D. crypting | |
| 405. |
Number of S - boxes used in DES algorithm is ............... |
| A. | 4 |
| B. | 8 |
| C. | 16 |
| D. | 32 |
| Answer» C. 16 | |
| 406. |
The number of subkeys generated in IDEA algorithm are ................. |
| A. | 54 |
| B. | 48 |
| C. | 52 |
| D. | 50 |
| Answer» D. 50 | |
| 407. |
The ................... portion of LAN management software restricts access, records user activities and audit data etc. |
| A. | Configuration management |
| B. | Security management |
| C. | Performance management |
| D. | None of these |
| Answer» C. Performance management | |
| 408. |
IN_ASYMMETRIC_ENCRYPTION?$ |
| A. | same key is used for encryption and decryption |
| B. | different keys are used encryption and decryption |
| C. | no key is required for encryption and decryption |
| D. | none of the mentioned |
| Answer» C. no key is required for encryption and decryption | |
| 409. |
PGP_ENCRYPTS_DATA_BY_USING_A_BLOCK_CIPHER_CALLED?$ |
| A. | international data encryption algorithm |
| B. | private data encryption algorithm |
| C. | intrenet data encryption algorithm |
| D. | none of the mentioned |
| Answer» B. private data encryption algorithm | |
| 410. |
Multipartite viruses attack o? |
| A. | files |
| B. | boot sector |
| C. | memory |
| D. | all of the mentioned |
| Answer» E. | |
| 411. |
Pretty good privacy (PGP) is used i? |
| A. | browser security |
| B. | email security |
| C. | FTP security |
| D. | none of the mentioned |
| Answer» C. FTP security | |