

MCQOPTIONS
Saved Bookmarks
This section includes 411 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System knowledge and support exam preparation. Choose a topic below to get started.
401. |
The length of the key in one time pad method is .................... |
A. | Random |
B. | Fixed |
C. | 64 |
D. | 56 |
Answer» B. Fixed | |
402. |
Which one of the following is correct ? |
A. | Character - represented by One’s Complement |
B. | Character - represented by Two’s Complement |
C. | Integer - represented by ASCII |
D. | Character - represented by Unicode |
Answer» E. | |
403. |
The type of encoding in which manipulation of bit streams without regard to what the bits mean is ..................... |
A. | Destination encoding |
B. | Entropy encoding |
C. | Source encoding |
D. | Differential encoding |
Answer» C. Source encoding | |
404. |
The art of breaking ciphers is known as: |
A. | cryptology |
B. | cryptography |
C. | cryptanalysis |
D. | crypting |
Answer» D. crypting | |
405. |
Number of S - boxes used in DES algorithm is ............... |
A. | 4 |
B. | 8 |
C. | 16 |
D. | 32 |
Answer» C. 16 | |
406. |
The number of subkeys generated in IDEA algorithm are ................. |
A. | 54 |
B. | 48 |
C. | 52 |
D. | 50 |
Answer» D. 50 | |
407. |
The ................... portion of LAN management software restricts access, records user activities and audit data etc. |
A. | Configuration management |
B. | Security management |
C. | Performance management |
D. | None of these |
Answer» C. Performance management | |
408. |
IN_ASYMMETRIC_ENCRYPTION?$ |
A. | same key is used for encryption and decryption |
B. | different keys are used encryption and decryption |
C. | no key is required for encryption and decryption |
D. | none of the mentioned |
Answer» C. no key is required for encryption and decryption | |
409. |
PGP_ENCRYPTS_DATA_BY_USING_A_BLOCK_CIPHER_CALLED?$ |
A. | international data encryption algorithm |
B. | private data encryption algorithm |
C. | intrenet data encryption algorithm |
D. | none of the mentioned |
Answer» B. private data encryption algorithm | |
410. |
Multipartite viruses attack o? |
A. | files |
B. | boot sector |
C. | memory |
D. | all of the mentioned |
Answer» E. | |
411. |
Pretty good privacy (PGP) is used i? |
A. | browser security |
B. | email security |
C. | FTP security |
D. | none of the mentioned |
Answer» C. FTP security | |