

MCQOPTIONS
Saved Bookmarks
This section includes 137 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering Mechanics knowledge and support exam preparation. Choose a topic below to get started.
51. |
Which mode of operation has the worst “error propagation” among the following? |
A. | EC |
B. | B CB |
C. | C CBC |
D. | OFB |
Answer» B. B CB | |
52. |
In ________ some cyber-criminals redirect the legitimate users to different phishingsites and web pages via emails, IMs, ads and spyware. |
A. | URL Redirection |
B. | DOS |
C. | Phishing |
D. | MiTM attack |
Answer» D. MiTM attack | |
53. |
Data which is easily readable & understandable without any special algorithm ormethod is called _________________. |
A. | Cipher-text |
B. | Plain text |
C. | Raw text |
D. | Encrypted text |
Answer» C. Raw text | |
54. |
The 4×4 byte matrices in the AES algorithm are called_______. |
A. | Permutations |
B. | Transitions |
C. | Words |
D. | States |
Answer» E. | |
55. |
When plain text is converted to unreadable format, it is termed as _____________. |
A. | Rotten text |
B. | Raw text |
C. | Cipher-text |
D. | Cipher |
Answer» D. Cipher | |
56. |
How many computation rounds does the simplified AES consists of? |
A. | 10 |
B. | 8 |
C. | 2 |
D. | 5 |
Answer» D. 5 | |
57. |
DES follows_________. |
A. | SP Networks |
B. | Feistel Cipher Structure |
C. | Caesars Cipher |
D. | Hash Algorithm |
Answer» C. Caesars Cipher | |
58. |
How many round keys are generated in the AES algorithm? |
A. | 12 |
B. | 11 |
C. | 10 |
D. | 8 |
Answer» C. 10 | |
59. |
The procedure to add bits to the last block is termed as _________________. |
A. | Padding |
B. | Hashing |
C. | Tuning |
D. | Decryption |
Answer» B. Hashing | |
60. |
In RSA, Ф(n) = _______ in terms of p and q. |
A. | (p+1)(q+1) |
B. | (p-1)(q-1) |
C. | (p)(q) |
D. | (p)/(q) |
Answer» C. (p)(q) | |
61. |
Perform encryption on the following PT using RSA and find the CT. p = 3; q = 11; M= 5. |
A. | 18 |
B. | 12 |
C. | 26 |
D. | 28 |
Answer» D. 28 | |
62. |
The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________. |
A. | Program file |
B. | Special file |
C. | Ordinary file |
D. | Encrypted file |
Answer» D. Encrypted file | |
63. |
Integrity is protection of data from all of the following except ________. |
A. | Unauthorized changes |
B. | Accidental changes |
C. | Data analysis |
D. | Intentional manipulation |
Answer» D. Intentional manipulation | |
64. |
DES stands for ________________. |
A. | Device Encryption Standard |
B. | Data Encrypted Standard |
C. | Data Encryption Security |
D. | Data Encryption Standard |
Answer» E. | |
65. |
____________ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text. |
A. | Polyalphabetic Cipher |
B. | Caesar Cipher |
C. | Playfair Cipher |
D. | Monoalphabetic Cipher |
Answer» C. Playfair Cipher | |
66. |
A security program cannot address which of the following business goals? |
A. | Accuracy of information |
B. | Change control |
C. | User expectations |
D. | Prevention of fraud |
Answer» B. Change control | |
67. |
How many step function do Round 1 and 2 each have in S-AES? |
A. | 1 and 4 |
B. | 3 and 4 |
C. | Both 4 |
D. | 4 and 3 |
Answer» E. | |
68. |
In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’? |
A. | p/q should give no remainder |
B. | p and q should be prime |
C. | p and q should be co-prime |
D. | p and q should be divisible by Ф(n) |
Answer» C. p and q should be co-prime | |
69. |
For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 andfind the cipher text. |
A. | C=23 |
B. | C=56 |
C. | C=92 |
D. | C=80 |
Answer» E. | |
70. |
A (n) ______ algorithm transforms ciphertext to plaintext. |
A. | Encryption |
B. | Decryption |
C. | Either (a) or (b) |
D. | Neither (a) nor (b) |
Answer» C. Either (a) or (b) | |
71. |
In AES the 4×4 bytes matrix key is transformed into a keys of size __________. |
A. | 60 words |
B. | 32 words |
C. | 52 words |
D. | 44 words |
Answer» E. | |
72. |
Perform encryption on the following PT using RSA and find the CT. p = 7; q = 11; M= 8. |
A. | 58 |
B. | 34 |
C. | 123 |
D. | 57 |
Answer» E. | |
73. |
A computer ________ is a malicious code which self-replicates by copying itself to otherprograms. |
A. | Program |
B. | Virus |
C. | Application |
D. | Worm |
Answer» C. Application | |
74. |
Perform encryption on the following PT using RSA and find the CT. p = 17; q = 31;M = 2. |
A. | 128 |
B. | 124 |
C. | 127 |
D. | 167 |
Answer» B. 124 | |
75. |
What is the block size in the Simplified AES algorithm? |
A. | 36 bits |
B. | 16 bits |
C. | 40 bits |
D. | 8 bits |
Answer» D. 8 bits | |
76. |
In brute force attack, on average half of all possible keys must be tried to achievesuccess. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» B. False | |
77. |
Possible threat to any information cannot be ________________. |
A. | Ignored |
B. | Protected |
C. | Transferre |
D. | D Reduced |
Answer» B. Protected | |
78. |
Perform encryption on the following PT using RSA and find the CT. p = 5; q = 11; M= 9. |
A. | 43 |
B. | 14 |
C. | 112 |
D. | 54 |
Answer» C. 112 | |
79. |
Once activated __________ can enable ____________to spy on the victim, steal theirsensitive information & gain backdoor access to the system. |
A. | Virus, Cyber-Criminals |
B. | Malware, Penetration Testers |
C. | Trojans, Cyber-Criminals |
D. | Virus, Penetration Testers |
Answer» D. Virus, Penetration Testers | |
80. |
Conventional cryptography is also known as _____________ or symmetric-keyencryption. |
A. | Secret-key |
B. | Public key |
C. | Protected key |
D. | Primary key |
Answer» B. Public key | |
81. |
n = 35; e = 5; C = 10. What is the plaintext (use RSA)? |
A. | 2 |
B. | 4 |
C. | 5 |
D. | 6 |
Answer» D. 6 | |
82. |
The information that gets transformed in encryption is ____________. |
A. | Plain text |
B. | Parallel text |
C. | Encrypted text |
D. | Decrypted text |
Answer» B. Parallel text | |
83. |
The ________________ has piece of the keyword that has the same length as that of theplaintext. |
A. | One-time pad |
B. | Hash functions |
C. | Vigenere Cipher |
D. | Block Cipher |
Answer» B. Hash functions | |
84. |
________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity. |
A. | Rolling Cipher |
B. | Shift Cipher |
C. | Playfair Cipher |
D. | Block Cipher |
Answer» C. Playfair Cipher | |
85. |
Compromising confidential information comes under _________. |
A. | Bug |
B. | Threat |
C. | Vulnerability |
D. | Attack |
Answer» C. Vulnerability | |
86. |
_______________ infects the master boot record and it is challenging and a complex task toremove this virus. |
A. | Boot Sector Virus |
B. | Polymorphi |
C. | C Multipartite |
D. | Troj |
Answer» B. Polymorphi | |
87. |
The intent of a __________ is to overkill the targeted server’s bandwidth and otherresources of the target website. |
A. | Phishing attack |
B. | DoS attack |
C. | Website attack |
D. | MiTM attack |
Answer» C. Website attack | |
88. |
In an RSA system the public key of a given user is e = 31, n = 3599. What is the privatekey of this user? |
A. | 1023 |
B. | 2432 |
C. | 2412 |
D. | 3031 |
Answer» E. | |
89. |
During a DOS attack, the regular traffic on the target _____________ will be eitherdawdling down or entirely interrupted. |
A. | Network |
B. | System |
C. | Website |
D. | Router |
Answer» D. Router | |
90. |
A _________ can gain access illegally to a system if the system is not properly tested inscanning and gaining access phase. |
A. | Security officer |
B. | Malicious hacker |
C. | Security auditor |
D. | Network analyst |
Answer» C. Security auditor | |
91. |
An algorithm in encryption is called _____________. |
A. | Algorithm |
B. | Procedure |
C. | Cipher |
D. | Module |
Answer» D. Module | |
92. |
Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen asthe AES algorithm? |
A. | Rijndael |
B. | RC6 |
C. | Blowfish |
D. | MARS |
Answer» E. | |
93. |
The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key. |
A. | 16 |
B. | 9 |
C. | 12 |
D. | 18 |
Answer» B. 9 | |
94. |
______________ infects the executable as well as the boot sectors. |
A. | Non-resident virus |
B. | Boot Sector Virus |
C. | Polymorphic Virus |
D. | Multipartite Virus |
Answer» E. | |
95. |
People will normally think it as a normal/regular file and your secret message will pass on without any _______________. |
A. | Cracking |
B. | Encryption |
C. | Suspicion |
D. | Decryption |
Answer» D. Decryption | |
96. |
For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher message=80 and thus find the plain text. |
A. | 5 |
B. | 12 |
C. | 43 |
D. | 54 |
Answer» B. 12 | |
97. |
The number of unique substitution boxes in DES after the 48 bit XOR operationare___. |
A. | 4 |
B. | 8 |
C. | 12 |
D. | 16 |
Answer» C. 12 | |
98. |
_________________ is the process or mechanism used for converting ordinary plaintext into garbled non-human readable text & vice-versa. |
A. | Malware Analysis |
B. | Exploit writing |
C. | Reverse engineering |
D. | Cryptography |
Answer» E. | |
99. |
What is the number of possible 3 x 3 affine cipher transformations? |
A. | 840 |
B. | 168 |
C. | 1344 |
D. | 1024 |
Answer» D. 1024 | |
100. |
Firewalls are to protect against________. |
A. | Virus Attacks |
B. | Fire Attacks |
C. | Data Driven Attacks |
D. | Unauthorized Attacks |
Answer» E. | |