Explore topic-wise MCQs in Testing Subject.

This section includes 657 Mcqs, each offering curated multiple-choice questions to sharpen your Testing Subject knowledge and support exam preparation. Choose a topic below to get started.

1.

Which mode of operation has the worst “error propagation” among the following?

A. EC
B. B CB
C. C CBC
D. OFB
Answer» B. B CB
2.

In ________ some cyber-criminals redirect the legitimate users to different phishingsites and web pages via emails, IMs, ads and spyware.

A. URL Redirection
B. DOS
C. Phishing
D. MiTM attack
Answer» D. MiTM attack
3.

Data which is easily readable & understandable without any special algorithm ormethod is called _________________.

A. Cipher-text
B. Plain text
C. Raw text
D. Encrypted text
Answer» C. Raw text
4.

The 4×4 byte matrices in the AES algorithm are called_______.

A. Permutations
B. Transitions
C. Words
D. States
Answer» E.
5.

When plain text is converted to unreadable format, it is termed as _____________.

A. Rotten text
B. Raw text
C. Cipher-text
D. Cipher
Answer» D. Cipher
6.

How many computation rounds does the simplified AES consists of?

A. 10
B. 8
C. 2
D. 5
Answer» D. 5
7.

DES follows_________.

A. SP Networks
B. Feistel Cipher Structure
C. Caesars Cipher
D. Hash Algorithm
Answer» C. Caesars Cipher
8.

How many round keys are generated in the AES algorithm?

A. 12
B. 11
C. 10
D. 8
Answer» C. 10
9.

The procedure to add bits to the last block is termed as _________________.

A. Padding
B. Hashing
C. Tuning
D. Decryption
Answer» B. Hashing
10.

In RSA, Ф(n) = _______ in terms of p and q.

A. (p+1)(q+1)
B. (p-1)(q-1)
C. (p)(q)
D. (p)/(q)
Answer» C. (p)(q)
11.

Perform encryption on the following PT using RSA and find the CT. p = 3; q = 11; M= 5.

A. 18
B. 12
C. 26
D. 28
Answer» D. 28
12.

The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.

A. Program file
B. Special file
C. Ordinary file
D. Encrypted file
Answer» D. Encrypted file
13.

Integrity is protection of data from all of the following except ________.

A. Unauthorized changes
B. Accidental changes
C. Data analysis
D. Intentional manipulation
Answer» D. Intentional manipulation
14.

DES stands for ________________.

A. Device Encryption Standard
B. Data Encrypted Standard
C. Data Encryption Security
D. Data Encryption Standard
Answer» E.
15.

____________ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text.

A. Polyalphabetic Cipher
B. Caesar Cipher
C. Playfair Cipher
D. Monoalphabetic Cipher
Answer» C. Playfair Cipher
16.

A security program cannot address which of the following business goals?

A. Accuracy of information
B. Change control
C. User expectations
D. Prevention of fraud
Answer» B. Change control
17.

How many step function do Round 1 and 2 each have in S-AES?

A. 1 and 4
B. 3 and 4
C. Both 4
D. 4 and 3
Answer» E.
18.

In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?

A. p/q should give no remainder
B. p and q should be prime
C. p and q should be co-prime
D. p and q should be divisible by Ф(n)
Answer» C. p and q should be co-prime
19.

For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 andfind the cipher text.

A. C=23
B. C=56
C. C=92
D. C=80
Answer» E.
20.

A (n) ______ algorithm transforms ciphertext to plaintext.

A. Encryption
B. Decryption
C. Either (a) or (b)
D. Neither (a) nor (b)
Answer» C. Either (a) or (b)
21.

In AES the 4×4 bytes matrix key is transformed into a keys of size __________.

A. 60 words
B. 32 words
C. 52 words
D. 44 words
Answer» E.
22.

Perform encryption on the following PT using RSA and find the CT. p = 7; q = 11; M= 8.

A. 58
B. 34
C. 123
D. 57
Answer» E.
23.

A computer ________ is a malicious code which self-replicates by copying itself to otherprograms.

A. Program
B. Virus
C. Application
D. Worm
Answer» C. Application
24.

Perform encryption on the following PT using RSA and find the CT. p = 17; q = 31;M = 2.

A. 128
B. 124
C. 127
D. 167
Answer» B. 124
25.

What is the block size in the Simplified AES algorithm?

A. 36 bits
B. 16 bits
C. 40 bits
D. 8 bits
Answer» D. 8 bits
26.

In brute force attack, on average half of all possible keys must be tried to achievesuccess.

A. True
B. False
C. none
D. all
Answer» B. False
27.

Possible threat to any information cannot be ________________.

A. Ignored
B. Protected
C. Transferre
D. D Reduced
Answer» B. Protected
28.

Perform encryption on the following PT using RSA and find the CT. p = 5; q = 11; M= 9.

A. 43
B. 14
C. 112
D. 54
Answer» C. 112
29.

Once activated __________ can enable ____________to spy on the victim, steal theirsensitive information & gain backdoor access to the system.

A. Virus, Cyber-Criminals
B. Malware, Penetration Testers
C. Trojans, Cyber-Criminals
D. Virus, Penetration Testers
Answer» D. Virus, Penetration Testers
30.

Conventional cryptography is also known as _____________ or symmetric-keyencryption.

A. Secret-key
B. Public key
C. Protected key
D. Primary key
Answer» B. Public key
31.

n = 35; e = 5; C = 10. What is the plaintext (use RSA)?

A. 2
B. 4
C. 5
D. 6
Answer» D. 6
32.

The information that gets transformed in encryption is ____________.

A. Plain text
B. Parallel text
C. Encrypted text
D. Decrypted text
Answer» B. Parallel text
33.

The ________________ has piece of the keyword that has the same length as that of theplaintext.

A. One-time pad
B. Hash functions
C. Vigenere Cipher
D. Block Cipher
Answer» B. Hash functions
34.

________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.

A. Rolling Cipher
B. Shift Cipher
C. Playfair Cipher
D. Block Cipher
Answer» C. Playfair Cipher
35.

Compromising confidential information comes under _________.

A. Bug
B. Threat
C. Vulnerability
D. Attack
Answer» C. Vulnerability
36.

_______________ infects the master boot record and it is challenging and a complex task toremove this virus.

A. Boot Sector Virus
B. Polymorphi
C. C Multipartite
D. Troj
Answer» B. Polymorphi
37.

The intent of a __________ is to overkill the targeted server’s bandwidth and otherresources of the target website.

A. Phishing attack
B. DoS attack
C. Website attack
D. MiTM attack
Answer» C. Website attack
38.

In an RSA system the public key of a given user is e = 31, n = 3599. What is the privatekey of this user?

A. 1023
B. 2432
C. 2412
D. 3031
Answer» E.
39.

During a DOS attack, the regular traffic on the target _____________ will be eitherdawdling down or entirely interrupted.

A. Network
B. System
C. Website
D. Router
Answer» D. Router
40.

A _________ can gain access illegally to a system if the system is not properly tested inscanning and gaining access phase.

A. Security officer
B. Malicious hacker
C. Security auditor
D. Network analyst
Answer» C. Security auditor
41.

An algorithm in encryption is called _____________.

A. Algorithm
B. Procedure
C. Cipher
D. Module
Answer» D. Module
42.

Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen asthe AES algorithm?

A. Rijndael
B. RC6
C. Blowfish
D. MARS
Answer» E.
43.

The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.

A. 16
B. 9
C. 12
D. 18
Answer» B. 9
44.

______________ infects the executable as well as the boot sectors.

A. Non-resident virus
B. Boot Sector Virus
C. Polymorphic Virus
D. Multipartite Virus
Answer» E.
45.

People will normally think it as a normal/regular file and your secret message will pass on without any _______________.

A. Cracking
B. Encryption
C. Suspicion
D. Decryption
Answer» D. Decryption
46.

For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher message=80 and thus find the plain text.

A. 5
B. 12
C. 43
D. 54
Answer» B. 12
47.

The number of unique substitution boxes in DES after the 48 bit XOR operationare___.

A. 4
B. 8
C. 12
D. 16
Answer» C. 12
48.

_________________ is the process or mechanism used for converting ordinary plaintext into garbled non-human readable text & vice-versa.

A. Malware Analysis
B. Exploit writing
C. Reverse engineering
D. Cryptography
Answer» E.
49.

What is the number of possible 3 x 3 affine cipher transformations?

A. 840
B. 168
C. 1344
D. 1024
Answer» D. 1024
50.

Firewalls are to protect against________.

A. Virus Attacks
B. Fire Attacks
C. Data Driven Attacks
D. Unauthorized Attacks
Answer» E.