MCQOPTIONS
Saved Bookmarks
This section includes 137 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering Mechanics knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Which mode of operation has the worst “error propagation” among the following? |
| A. | EC |
| B. | B CB |
| C. | C CBC |
| D. | OFB |
| Answer» B. B CB | |
| 52. |
In ________ some cyber-criminals redirect the legitimate users to different phishingsites and web pages via emails, IMs, ads and spyware. |
| A. | URL Redirection |
| B. | DOS |
| C. | Phishing |
| D. | MiTM attack |
| Answer» D. MiTM attack | |
| 53. |
Data which is easily readable & understandable without any special algorithm ormethod is called _________________. |
| A. | Cipher-text |
| B. | Plain text |
| C. | Raw text |
| D. | Encrypted text |
| Answer» C. Raw text | |
| 54. |
The 4×4 byte matrices in the AES algorithm are called_______. |
| A. | Permutations |
| B. | Transitions |
| C. | Words |
| D. | States |
| Answer» E. | |
| 55. |
When plain text is converted to unreadable format, it is termed as _____________. |
| A. | Rotten text |
| B. | Raw text |
| C. | Cipher-text |
| D. | Cipher |
| Answer» D. Cipher | |
| 56. |
How many computation rounds does the simplified AES consists of? |
| A. | 10 |
| B. | 8 |
| C. | 2 |
| D. | 5 |
| Answer» D. 5 | |
| 57. |
DES follows_________. |
| A. | SP Networks |
| B. | Feistel Cipher Structure |
| C. | Caesars Cipher |
| D. | Hash Algorithm |
| Answer» C. Caesars Cipher | |
| 58. |
How many round keys are generated in the AES algorithm? |
| A. | 12 |
| B. | 11 |
| C. | 10 |
| D. | 8 |
| Answer» C. 10 | |
| 59. |
The procedure to add bits to the last block is termed as _________________. |
| A. | Padding |
| B. | Hashing |
| C. | Tuning |
| D. | Decryption |
| Answer» B. Hashing | |
| 60. |
In RSA, Ф(n) = _______ in terms of p and q. |
| A. | (p+1)(q+1) |
| B. | (p-1)(q-1) |
| C. | (p)(q) |
| D. | (p)/(q) |
| Answer» C. (p)(q) | |
| 61. |
Perform encryption on the following PT using RSA and find the CT. p = 3; q = 11; M= 5. |
| A. | 18 |
| B. | 12 |
| C. | 26 |
| D. | 28 |
| Answer» D. 28 | |
| 62. |
The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________. |
| A. | Program file |
| B. | Special file |
| C. | Ordinary file |
| D. | Encrypted file |
| Answer» D. Encrypted file | |
| 63. |
Integrity is protection of data from all of the following except ________. |
| A. | Unauthorized changes |
| B. | Accidental changes |
| C. | Data analysis |
| D. | Intentional manipulation |
| Answer» D. Intentional manipulation | |
| 64. |
DES stands for ________________. |
| A. | Device Encryption Standard |
| B. | Data Encrypted Standard |
| C. | Data Encryption Security |
| D. | Data Encryption Standard |
| Answer» E. | |
| 65. |
____________ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text. |
| A. | Polyalphabetic Cipher |
| B. | Caesar Cipher |
| C. | Playfair Cipher |
| D. | Monoalphabetic Cipher |
| Answer» C. Playfair Cipher | |
| 66. |
A security program cannot address which of the following business goals? |
| A. | Accuracy of information |
| B. | Change control |
| C. | User expectations |
| D. | Prevention of fraud |
| Answer» B. Change control | |
| 67. |
How many step function do Round 1 and 2 each have in S-AES? |
| A. | 1 and 4 |
| B. | 3 and 4 |
| C. | Both 4 |
| D. | 4 and 3 |
| Answer» E. | |
| 68. |
In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’? |
| A. | p/q should give no remainder |
| B. | p and q should be prime |
| C. | p and q should be co-prime |
| D. | p and q should be divisible by Ф(n) |
| Answer» C. p and q should be co-prime | |
| 69. |
For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 andfind the cipher text. |
| A. | C=23 |
| B. | C=56 |
| C. | C=92 |
| D. | C=80 |
| Answer» E. | |
| 70. |
A (n) ______ algorithm transforms ciphertext to plaintext. |
| A. | Encryption |
| B. | Decryption |
| C. | Either (a) or (b) |
| D. | Neither (a) nor (b) |
| Answer» C. Either (a) or (b) | |
| 71. |
In AES the 4×4 bytes matrix key is transformed into a keys of size __________. |
| A. | 60 words |
| B. | 32 words |
| C. | 52 words |
| D. | 44 words |
| Answer» E. | |
| 72. |
Perform encryption on the following PT using RSA and find the CT. p = 7; q = 11; M= 8. |
| A. | 58 |
| B. | 34 |
| C. | 123 |
| D. | 57 |
| Answer» E. | |
| 73. |
A computer ________ is a malicious code which self-replicates by copying itself to otherprograms. |
| A. | Program |
| B. | Virus |
| C. | Application |
| D. | Worm |
| Answer» C. Application | |
| 74. |
Perform encryption on the following PT using RSA and find the CT. p = 17; q = 31;M = 2. |
| A. | 128 |
| B. | 124 |
| C. | 127 |
| D. | 167 |
| Answer» B. 124 | |
| 75. |
What is the block size in the Simplified AES algorithm? |
| A. | 36 bits |
| B. | 16 bits |
| C. | 40 bits |
| D. | 8 bits |
| Answer» D. 8 bits | |
| 76. |
In brute force attack, on average half of all possible keys must be tried to achievesuccess. |
| A. | True |
| B. | False |
| C. | none |
| D. | all |
| Answer» B. False | |
| 77. |
Possible threat to any information cannot be ________________. |
| A. | Ignored |
| B. | Protected |
| C. | Transferre |
| D. | D Reduced |
| Answer» B. Protected | |
| 78. |
Perform encryption on the following PT using RSA and find the CT. p = 5; q = 11; M= 9. |
| A. | 43 |
| B. | 14 |
| C. | 112 |
| D. | 54 |
| Answer» C. 112 | |
| 79. |
Once activated __________ can enable ____________to spy on the victim, steal theirsensitive information & gain backdoor access to the system. |
| A. | Virus, Cyber-Criminals |
| B. | Malware, Penetration Testers |
| C. | Trojans, Cyber-Criminals |
| D. | Virus, Penetration Testers |
| Answer» D. Virus, Penetration Testers | |
| 80. |
Conventional cryptography is also known as _____________ or symmetric-keyencryption. |
| A. | Secret-key |
| B. | Public key |
| C. | Protected key |
| D. | Primary key |
| Answer» B. Public key | |
| 81. |
n = 35; e = 5; C = 10. What is the plaintext (use RSA)? |
| A. | 2 |
| B. | 4 |
| C. | 5 |
| D. | 6 |
| Answer» D. 6 | |
| 82. |
The information that gets transformed in encryption is ____________. |
| A. | Plain text |
| B. | Parallel text |
| C. | Encrypted text |
| D. | Decrypted text |
| Answer» B. Parallel text | |
| 83. |
The ________________ has piece of the keyword that has the same length as that of theplaintext. |
| A. | One-time pad |
| B. | Hash functions |
| C. | Vigenere Cipher |
| D. | Block Cipher |
| Answer» B. Hash functions | |
| 84. |
________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity. |
| A. | Rolling Cipher |
| B. | Shift Cipher |
| C. | Playfair Cipher |
| D. | Block Cipher |
| Answer» C. Playfair Cipher | |
| 85. |
Compromising confidential information comes under _________. |
| A. | Bug |
| B. | Threat |
| C. | Vulnerability |
| D. | Attack |
| Answer» C. Vulnerability | |
| 86. |
_______________ infects the master boot record and it is challenging and a complex task toremove this virus. |
| A. | Boot Sector Virus |
| B. | Polymorphi |
| C. | C Multipartite |
| D. | Troj |
| Answer» B. Polymorphi | |
| 87. |
The intent of a __________ is to overkill the targeted server’s bandwidth and otherresources of the target website. |
| A. | Phishing attack |
| B. | DoS attack |
| C. | Website attack |
| D. | MiTM attack |
| Answer» C. Website attack | |
| 88. |
In an RSA system the public key of a given user is e = 31, n = 3599. What is the privatekey of this user? |
| A. | 1023 |
| B. | 2432 |
| C. | 2412 |
| D. | 3031 |
| Answer» E. | |
| 89. |
During a DOS attack, the regular traffic on the target _____________ will be eitherdawdling down or entirely interrupted. |
| A. | Network |
| B. | System |
| C. | Website |
| D. | Router |
| Answer» D. Router | |
| 90. |
A _________ can gain access illegally to a system if the system is not properly tested inscanning and gaining access phase. |
| A. | Security officer |
| B. | Malicious hacker |
| C. | Security auditor |
| D. | Network analyst |
| Answer» C. Security auditor | |
| 91. |
An algorithm in encryption is called _____________. |
| A. | Algorithm |
| B. | Procedure |
| C. | Cipher |
| D. | Module |
| Answer» D. Module | |
| 92. |
Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen asthe AES algorithm? |
| A. | Rijndael |
| B. | RC6 |
| C. | Blowfish |
| D. | MARS |
| Answer» E. | |
| 93. |
The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key. |
| A. | 16 |
| B. | 9 |
| C. | 12 |
| D. | 18 |
| Answer» B. 9 | |
| 94. |
______________ infects the executable as well as the boot sectors. |
| A. | Non-resident virus |
| B. | Boot Sector Virus |
| C. | Polymorphic Virus |
| D. | Multipartite Virus |
| Answer» E. | |
| 95. |
People will normally think it as a normal/regular file and your secret message will pass on without any _______________. |
| A. | Cracking |
| B. | Encryption |
| C. | Suspicion |
| D. | Decryption |
| Answer» D. Decryption | |
| 96. |
For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher message=80 and thus find the plain text. |
| A. | 5 |
| B. | 12 |
| C. | 43 |
| D. | 54 |
| Answer» B. 12 | |
| 97. |
The number of unique substitution boxes in DES after the 48 bit XOR operationare___. |
| A. | 4 |
| B. | 8 |
| C. | 12 |
| D. | 16 |
| Answer» C. 12 | |
| 98. |
_________________ is the process or mechanism used for converting ordinary plaintext into garbled non-human readable text & vice-versa. |
| A. | Malware Analysis |
| B. | Exploit writing |
| C. | Reverse engineering |
| D. | Cryptography |
| Answer» E. | |
| 99. |
What is the number of possible 3 x 3 affine cipher transformations? |
| A. | 840 |
| B. | 168 |
| C. | 1344 |
| D. | 1024 |
| Answer» D. 1024 | |
| 100. |
Firewalls are to protect against________. |
| A. | Virus Attacks |
| B. | Fire Attacks |
| C. | Data Driven Attacks |
| D. | Unauthorized Attacks |
| Answer» E. | |