

MCQOPTIONS
Saved Bookmarks
This section includes 411 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System knowledge and support exam preparation. Choose a topic below to get started.
351. |
In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encryption)WELCOME TO NETWORK SECURITY ! |
A. | WMEKREETSILTWETCOOCYONRU! |
B. | EETSICOOCYWMEKRONRU!LTWET |
C. | LTWETONRU!WMEKRCOOCYEETSI |
D. | ONRU!COOCYLTWETEETSIWMEKR |
Answer» C. LTWETONRU!WMEKRCOOCYEETSI | |
352. |
In _______ authentication, the claimant proves that she knows the secret without sending it to the verifier. |
A. | zero knowledge |
B. | symmetric |
C. | asymmetric |
D. | challenge response |
Answer» E. | |
353. |
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires |
A. | Anarkali’s public key. |
B. | Salim’s public key. |
C. | Salim’s private key. |
D. | Anarkali’s private key. |
Answer» B. Salim’s public key. | |
354. |
A computer virus is a |
A. | Hardware |
B. | Software |
C. | Bacteria |
D. | Freeware |
Answer» C. Bacteria | |
355. |
Consider the following statement.I. Packet Filter Firewall analyze network traffic at transport layer.II. Circuit Level Firewall operate at transport and session layer of OSI Model.From the above statement which statement/s is/are True |
A. | None |
B. | Only II |
C. | I and II |
D. | Only I |
Answer» C. I and II | |
356. |
A sender S sends a message m to receiver R, which is digitally signed by S with its private key. In this scenario. One or more of the following security violations can take place.1) S can launch a birthday attack to replace m with a fraudulent message.2) A third-party attacker can launch a birthday attack to replace m with a fraudulent message. 3) R can launch a birthday attack to replace m with a fraudulent message.Which of the following are possible security violations? |
A. | 1 and 2 only |
B. | 1 only |
C. | 2 only |
D. | 2 and 3 only |
Answer» C. 2 only | |
357. |
In RSA algorithm if p = 7, q = 11 and e = 13 then what will be the value of d? |
A. | 40 |
B. | 13 |
C. | 37 |
D. | 23 |
Answer» D. 23 | |
358. |
Let P = 17 and Q = 11 is taken in RSA algorithm, what are possible values of E( (public key), N and D (Private key) respectively? |
A. | 5, 187, 37 |
B. | 7, 160, 23 |
C. | 7, 187, 23 |
D. | 9, 160, 37 |
Answer» D. 9, 160, 37 | |
359. |
MD5 is a widely used hash function for producing hash value of |
A. | 64 bits |
B. | 128 bits |
C. | 512 bits |
D. | 1024 bits |
Answer» C. 512 bits | |
360. |
A digital signature is required: |
A. | for non-repudiation of communication by a sender |
B. | for all e-mail sending |
C. | for all DHCP server |
D. | for FTP transactions |
Answer» B. for all e-mail sending | |
361. |
_______ is not a public key cryptosystem. |
A. | El Gamal |
B. | AES |
C. | Rabin |
D. | RSA |
Answer» C. Rabin | |
362. |
For using passwords on the Internet, a software is used so that the password is not intercepted easily. It is called |
A. | Coding |
B. | Malware |
C. | Virus |
D. | Encryption |
Answer» E. | |
363. |
_____ uses pretty good privacy algorithm. |
A. | Electronic mails |
B. | File encryption |
C. | Both Electronic mails and File encryption |
D. | None of the options |
Answer» D. None of the options | |
364. |
In a columnar transposition cipher, the plain text is “the tomato is a plant in the night shade family”, keyword is “TOMATO”. The cipher text is |
A. | “TINESAX / EOAHTFX / HTLTHEY / MAILAIX / TAPNGDL / OSTNHMX” |
B. | “TINESAX / EOAHTEX / MAILAIX / HTLTHEY / TAPNGDL / OSTNHMX” |
C. | “TINESAX / EOAHTFX / HTLTHEY / MAILAIX / OSTNHMX / TAPNGDL” |
D. | “EOAHTFX / TINESAX / HTLTHEY / MAILAIX / TAPNGDL / OSTNHMX” |
Answer» B. “TINESAX / EOAHTEX / MAILAIX / HTLTHEY / TAPNGDL / OSTNHMX” | |
365. |
Avalanche effect in cryptography refers |
A. | Large changes in cipher text when the keyword is changed minimally |
B. | Large changes in cipher text when the plain text is changed |
C. | Large Impact of keyword change to length of the cipher text |
D. | Both 1 and 2 |
Answer» E. | |
366. |
_____ tells a firewall about how to reassemble a data stream that has been divided into packets. |
A. | The source routing feature |
B. | The number in the header's identification field |
C. | The destination IP address |
D. | The header checksum field in the packet header |
Answer» B. The number in the header's identification field | |
367. |
In RSA1. p and q are chosen as very large prime number2. Compute n = p * q and ϕ(n) = (p-1) * (q-1)Later e encryption key chosen. How this encryption key is selected? |
A. | e is chosen as a relative prime to ϕ(n) |
B. | e is chosen as a relative prime to q |
C. | e is chosen as a relative prime to n |
D. | e is chosen as a relative prime to p |
Answer» B. e is chosen as a relative prime to q | |
368. |
Given below are two statements: One is labeled as Assertion (A) and the other is labeled as Reason (R) :Statement I: In Caesar Cipher each letter of Plain text is replaced by another letter for encryption. Statement II: Diffie-Hellman algorithm is used for exchange of secret key. In the light of the above statements, choose the correct answer from the options given below: |
A. | Both Statement I and Statement II are true |
B. | Both Statement I and Statement II are false |
C. | Statement I is correct but Statement II is false |
D. | Statement I is incorrect but Statement II is true |
Answer» B. Both Statement I and Statement II are false | |
369. |
An IP machine Q has a path to another IP machine H via three IP routers R1, R2, and R3.Q—R1—R2—R3—HH acts as an HTTP server, and Q connects to H via HTTP and downloads a file. Session layer Encryption is used, with DES as the shared key encryption protocol. Consider the following fourPieces of information:[I1] The URL of the file downloaded by Q[I2] The TCP port numbers at Q and H[I3] The IP addresses of Q and H[I4] The link layer addresses of Q and HWhich of I1, I2, I3, and I4 can an intruder learn through sniffing at R2 alone? |
A. | Only I1 and I2 |
B. | Only I1 |
C. | Only I2 and I3 |
D. | Only I3 and I4 |
Answer» D. Only I3 and I4 | |
370. |
Consider that B wants to send a message m that is digitally signed to A. Let the pair of private and public keys for A and B be denoted by \(K_{x}^{-}\) and \(K_{x}^{+}\) for x = A, B, respectively. Let Kx(m) represent the operation of encrypting m with a key Kx and H(m) represent the message digest. Which one of the following indicates the CORRECT way of sending the message m along with the digital signature to A? |
A. | \(\left\{ m,~K_{B}^{+}~\left( H\left( m \right) \right) \right\}\) |
B. | \(\left\{ m,~K_{B}^{-}\left( H\left( m \right) \right) \right\}\) |
C. | \(\left\{ m,~K_{A}^{-}\left( H\left( m \right) \right) \right\}\) |
D. | \(\left\{ m,~K_{A}^{+}\left( m \right) \right\}\) |
Answer» C. \(\left\{ m,~K_{A}^{-}\left( H\left( m \right) \right) \right\}\) | |
371. |
Which of the following script creates master key? |
A. | CREATE MASTER KEY |
B. | CREATE MASTER KEY ENCRYPTION |
C. | CREATE MASTER ENCRYPTION |
D. | All of the mentioned |
Answer» C. CREATE MASTER ENCRYPTION | |
372. |
The schema securable scope contains the following securable is __________ |
A. | Contract |
B. | Asymmetric key |
C. | Schema |
D. | Object |
Answer» E. | |
373. |
What is the syntax for HAS_PERMS_BY_NAME in SQL Server 2014? |
A. | HAS_PERMS_NAME ( securable_class , permission |
B. | HAS_PERMS_BY_NAME ( securable , securable_class , permission |
C. | HAS_PERMS_BY_NAME ( securable , securable_class , permission |
D. | HAS_PERMS( securable , securable_class , permission |
Answer» C. HAS_PERMS_BY_NAME ( securable , securable_class , permission | |
374. |
What is the syntax for fn_my_permissions function in SQL Server 2014? |
A. | fn_my_permissions ( securable , securable_class ) |
B. | fn_my_permissions ( securable , ‘securable_class’ ) |
C. | fn_my_permissions ( ‘securable’ , securable_class) |
D. | fn_my_permissions ( ‘securable’ , ‘securable_class’ ) |
Answer» C. fn_my_permissions ( ‘securable’ , securable_class) | |
375. |
The major components of the Label Security Toolkit are _____________ |
A. | Documentation |
B. | The Label Policy Designer application |
C. | Examples showing the implementation of row- and cell-level security in different scenarios |
D. | All of the mentioned |
Answer» E. | |
376. |
Which of the following is valid code to backup a certificate? |
A. | USE Master |
B. | USE Master |
C. | USE Master |
D. | USE Master |
Answer» B. USE Master | |
377. |
To add or remove server role membership use ____________ |
A. | ALTER ROLE |
B. | ALTER ANY LOGIN |
C. | ALTER SERVER ROLE |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
378. |
Which of the following returns a row for each security principal in a SQL Server database? |
A. | sys.database_role_members |
B. | sys.sql_logins |
C. | sys.database_principals |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
379. |
Which of the statement is used to create a new certificate with a valid subject in SQL Server? |
A. | CREATE CERTI MySQLCert |
B. | CREATE CERTIFICATE MySQLCert |
C. | CREATE CERTIFICATE MySQLCert |
D. | None of the mentioned |
Answer» C. CREATE CERTIFICATE MySQLCert | |
380. |
Return type of CertName field in vwVisibleLabels is __________ |
A. | XML |
B. | INT |
C. | NVARCHAR(256) |
D. | VARCHAR(256) |
Answer» D. VARCHAR(256) | |
381. |
View that contains the list of all the security labels present in the database are __________ |
A. | vwVisibleLabels |
B. | VisibleLabels |
C. | vwVisibleLabel |
D. | All of the mentioned |
Answer» B. VisibleLabels | |
382. |
Which of the following will not return user name of the current session? |
A. | CUURENT_USER() |
B. | USER_NAME() |
C. | CUSER_NAME() |
D. | None of the mentioned |
Answer» E. | |
383. |
Which of the field must be 1 using an authenticator in the following code? |
A. | @add_authenticator |
B. | @cleartext |
C. | key_GUID |
D. | None of the mentioned |
Answer» B. @cleartext | |
384. |
What is the role of WITH NAME in the following code? |
A. | Removes the specified server principal from the server role |
B. | Adds the specified server principal to the server role |
C. | Specifies the new name of the user-defined server role |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
385. |
Which of the following authentication modes is more secure? |
A. | SQL Server Authentication |
B. | Windows Authentication |
C. | Mixed Mode |
D. | All of the mentioned |
Answer» C. Mixed Mode | |
386. |
Windows Authentication Mode is not available when an instance of SQL Server is running on ____________ |
A. | Windows 98 |
B. | Windows 7 |
C. | Windows 95 |
D. | All of the mentioned |
Answer» B. Windows 7 | |
387. |
________ optional password policies are available for SQL Server logins. |
A. | 2 |
B. | 3 |
C. | 5 |
D. | All of the mentioned |
Answer» C. 5 | |
388. |
Which of the following code is used to enable the sa login? |
A. | ALTER LOGIN sa ENABLE ; |
B. | ALTER LOGIN sa DISABLE ; |
C. | ALTER LOGIN sa ENABLE ; |
D. | None of the mentioned |
Answer» B. ALTER LOGIN sa DISABLE ; | |
389. |
Which of the following is the biggest disadvantage of SQL Server Authentication mode? |
A. | SQL Server Authentication cannot use Kerberos security protocol |
B. | Allows SQL Server to support Web-based applications where users create their own identities |
C. | Allows SQL Server to support older applications and applications provided by third parties that require SQL Server Authentication |
D. | None of the mentioned |
Answer» B. Allows SQL Server to support Web-based applications where users create their own identities | |
390. |
When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialog ? |
A. | Security procedure |
B. | Log-on procedure |
C. | Safeguard procedure |
D. | Identification procedure |
Answer» C. Safeguard procedure | |
391. |
Decryption and Encryption of data are the responsibility of which of the following layer? |
A. | Session layer |
B. | Network layer |
C. | Transport layer |
D. | Presentation layer |
Answer» E. | |
392. |
Firewalls are used for ................ |
A. | routing |
B. | security |
C. | tunnelling |
D. | congestion control |
Answer» C. tunnelling | |
393. |
What is the port number for (HTTP Secure) HTTPS? |
A. | 43 |
B. | 443 |
C. | 445 |
D. | 444 |
Answer» C. 445 | |
394. |
Caesar cipher is represented as ................. |
A. | C = (p+3)mod3 |
B. | C = (p+26)mod3 |
C. | C = (p-3)mod26 |
D. | C = (p+3)mod26 |
Answer» E. | |
395. |
………….transform message into format (cyber text) that cannot be read by hackers. |
A. | Decryption |
B. | Encryption |
C. | Transformation |
D. | None of these |
Answer» C. Transformation | |
396. |
..………..is used to validate the identity of the message sender to the recipient. |
A. | Encryption |
B. | Decryption |
C. | Digital certificate |
D. | None of these |
Answer» D. None of these | |
397. |
Number of rounds in Data Encryption Standard algorithm? |
A. | 8 rounds |
B. | 12 rounds |
C. | 16 rounds |
D. | 24 rounds |
Answer» D. 24 rounds | |
398. |
In cryptography the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message (spaces are omitted during encryption) WELCOME TO NETWORK SECURITY! |
A. | WMEKREETSILTWETCOOCYONRU! |
B. | EETSICOOCYWMEKRONRU!LTWET |
C. | LTWETONRU!WMEKRCOOCYEETSI |
D. | ONRU!COOCYLTWETEETSIWMEKR |
Answer» C. LTWETONRU!WMEKRCOOCYEETSI | |
399. |
............... is an example for public key algorithm. |
A. | RSA |
B. | DES |
C. | IREA |
D. | RC5 |
Answer» B. DES | |
400. |
The protocol used to provide security to e-mails? |
A. | POP |
B. | PGP |
C. | SNMP |
D. | HTTP |
Answer» C. SNMP | |