Explore topic-wise MCQs in Engineering Mechanics.

This section includes 137 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering Mechanics knowledge and support exam preparation. Choose a topic below to get started.

51.

Which mode of operation has the worst “error propagation” among the following?

A. EC
B. B CB
C. C CBC
D. OFB
Answer» B. B CB
52.

In ________ some cyber-criminals redirect the legitimate users to different phishingsites and web pages via emails, IMs, ads and spyware.

A. URL Redirection
B. DOS
C. Phishing
D. MiTM attack
Answer» D. MiTM attack
53.

Data which is easily readable & understandable without any special algorithm ormethod is called _________________.

A. Cipher-text
B. Plain text
C. Raw text
D. Encrypted text
Answer» C. Raw text
54.

The 4×4 byte matrices in the AES algorithm are called_______.

A. Permutations
B. Transitions
C. Words
D. States
Answer» E.
55.

When plain text is converted to unreadable format, it is termed as _____________.

A. Rotten text
B. Raw text
C. Cipher-text
D. Cipher
Answer» D. Cipher
56.

How many computation rounds does the simplified AES consists of?

A. 10
B. 8
C. 2
D. 5
Answer» D. 5
57.

DES follows_________.

A. SP Networks
B. Feistel Cipher Structure
C. Caesars Cipher
D. Hash Algorithm
Answer» C. Caesars Cipher
58.

How many round keys are generated in the AES algorithm?

A. 12
B. 11
C. 10
D. 8
Answer» C. 10
59.

The procedure to add bits to the last block is termed as _________________.

A. Padding
B. Hashing
C. Tuning
D. Decryption
Answer» B. Hashing
60.

In RSA, Ф(n) = _______ in terms of p and q.

A. (p+1)(q+1)
B. (p-1)(q-1)
C. (p)(q)
D. (p)/(q)
Answer» C. (p)(q)
61.

Perform encryption on the following PT using RSA and find the CT. p = 3; q = 11; M= 5.

A. 18
B. 12
C. 26
D. 28
Answer» D. 28
62.

The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.

A. Program file
B. Special file
C. Ordinary file
D. Encrypted file
Answer» D. Encrypted file
63.

Integrity is protection of data from all of the following except ________.

A. Unauthorized changes
B. Accidental changes
C. Data analysis
D. Intentional manipulation
Answer» D. Intentional manipulation
64.

DES stands for ________________.

A. Device Encryption Standard
B. Data Encrypted Standard
C. Data Encryption Security
D. Data Encryption Standard
Answer» E.
65.

____________ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text.

A. Polyalphabetic Cipher
B. Caesar Cipher
C. Playfair Cipher
D. Monoalphabetic Cipher
Answer» C. Playfair Cipher
66.

A security program cannot address which of the following business goals?

A. Accuracy of information
B. Change control
C. User expectations
D. Prevention of fraud
Answer» B. Change control
67.

How many step function do Round 1 and 2 each have in S-AES?

A. 1 and 4
B. 3 and 4
C. Both 4
D. 4 and 3
Answer» E.
68.

In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?

A. p/q should give no remainder
B. p and q should be prime
C. p and q should be co-prime
D. p and q should be divisible by Ф(n)
Answer» C. p and q should be co-prime
69.

For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 andfind the cipher text.

A. C=23
B. C=56
C. C=92
D. C=80
Answer» E.
70.

A (n) ______ algorithm transforms ciphertext to plaintext.

A. Encryption
B. Decryption
C. Either (a) or (b)
D. Neither (a) nor (b)
Answer» C. Either (a) or (b)
71.

In AES the 4×4 bytes matrix key is transformed into a keys of size __________.

A. 60 words
B. 32 words
C. 52 words
D. 44 words
Answer» E.
72.

Perform encryption on the following PT using RSA and find the CT. p = 7; q = 11; M= 8.

A. 58
B. 34
C. 123
D. 57
Answer» E.
73.

A computer ________ is a malicious code which self-replicates by copying itself to otherprograms.

A. Program
B. Virus
C. Application
D. Worm
Answer» C. Application
74.

Perform encryption on the following PT using RSA and find the CT. p = 17; q = 31;M = 2.

A. 128
B. 124
C. 127
D. 167
Answer» B. 124
75.

What is the block size in the Simplified AES algorithm?

A. 36 bits
B. 16 bits
C. 40 bits
D. 8 bits
Answer» D. 8 bits
76.

In brute force attack, on average half of all possible keys must be tried to achievesuccess.

A. True
B. False
C. none
D. all
Answer» B. False
77.

Possible threat to any information cannot be ________________.

A. Ignored
B. Protected
C. Transferre
D. D Reduced
Answer» B. Protected
78.

Perform encryption on the following PT using RSA and find the CT. p = 5; q = 11; M= 9.

A. 43
B. 14
C. 112
D. 54
Answer» C. 112
79.

Once activated __________ can enable ____________to spy on the victim, steal theirsensitive information & gain backdoor access to the system.

A. Virus, Cyber-Criminals
B. Malware, Penetration Testers
C. Trojans, Cyber-Criminals
D. Virus, Penetration Testers
Answer» D. Virus, Penetration Testers
80.

Conventional cryptography is also known as _____________ or symmetric-keyencryption.

A. Secret-key
B. Public key
C. Protected key
D. Primary key
Answer» B. Public key
81.

n = 35; e = 5; C = 10. What is the plaintext (use RSA)?

A. 2
B. 4
C. 5
D. 6
Answer» D. 6
82.

The information that gets transformed in encryption is ____________.

A. Plain text
B. Parallel text
C. Encrypted text
D. Decrypted text
Answer» B. Parallel text
83.

The ________________ has piece of the keyword that has the same length as that of theplaintext.

A. One-time pad
B. Hash functions
C. Vigenere Cipher
D. Block Cipher
Answer» B. Hash functions
84.

________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.

A. Rolling Cipher
B. Shift Cipher
C. Playfair Cipher
D. Block Cipher
Answer» C. Playfair Cipher
85.

Compromising confidential information comes under _________.

A. Bug
B. Threat
C. Vulnerability
D. Attack
Answer» C. Vulnerability
86.

_______________ infects the master boot record and it is challenging and a complex task toremove this virus.

A. Boot Sector Virus
B. Polymorphi
C. C Multipartite
D. Troj
Answer» B. Polymorphi
87.

The intent of a __________ is to overkill the targeted server’s bandwidth and otherresources of the target website.

A. Phishing attack
B. DoS attack
C. Website attack
D. MiTM attack
Answer» C. Website attack
88.

In an RSA system the public key of a given user is e = 31, n = 3599. What is the privatekey of this user?

A. 1023
B. 2432
C. 2412
D. 3031
Answer» E.
89.

During a DOS attack, the regular traffic on the target _____________ will be eitherdawdling down or entirely interrupted.

A. Network
B. System
C. Website
D. Router
Answer» D. Router
90.

A _________ can gain access illegally to a system if the system is not properly tested inscanning and gaining access phase.

A. Security officer
B. Malicious hacker
C. Security auditor
D. Network analyst
Answer» C. Security auditor
91.

An algorithm in encryption is called _____________.

A. Algorithm
B. Procedure
C. Cipher
D. Module
Answer» D. Module
92.

Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen asthe AES algorithm?

A. Rijndael
B. RC6
C. Blowfish
D. MARS
Answer» E.
93.

The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.

A. 16
B. 9
C. 12
D. 18
Answer» B. 9
94.

______________ infects the executable as well as the boot sectors.

A. Non-resident virus
B. Boot Sector Virus
C. Polymorphic Virus
D. Multipartite Virus
Answer» E.
95.

People will normally think it as a normal/regular file and your secret message will pass on without any _______________.

A. Cracking
B. Encryption
C. Suspicion
D. Decryption
Answer» D. Decryption
96.

For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher message=80 and thus find the plain text.

A. 5
B. 12
C. 43
D. 54
Answer» B. 12
97.

The number of unique substitution boxes in DES after the 48 bit XOR operationare___.

A. 4
B. 8
C. 12
D. 16
Answer» C. 12
98.

_________________ is the process or mechanism used for converting ordinary plaintext into garbled non-human readable text & vice-versa.

A. Malware Analysis
B. Exploit writing
C. Reverse engineering
D. Cryptography
Answer» E.
99.

What is the number of possible 3 x 3 affine cipher transformations?

A. 840
B. 168
C. 1344
D. 1024
Answer» D. 1024
100.

Firewalls are to protect against________.

A. Virus Attacks
B. Fire Attacks
C. Data Driven Attacks
D. Unauthorized Attacks
Answer» E.