100+ Information and Network Security Solved MCQs

1.

An algorithm in encryption is called _____________.

A. Algorithm
B. Procedure
C. Cipher
D. Module
Answer» C. Cipher
2.

The information that gets transformed in encryption is ____________.

A. Plain text
B. Parallel text
C. Encrypted text
D. Decrypted text
Answer» A. Plain text
3.

In brute force attack, on average half of all possible keys must be tried to achieve success.

A. True
B. False
C. none
D. all
Answer» A. True
4.

A (n) ______ algorithm transforms ciphertext to plaintext.

A. Encryption
B. Decryption
C. Either (a) or (b)
D. Neither (a) nor (b)
Answer» B. Decryption
5.

The ________ is the message after transformation.

A. Ciphertext
B. Plaintext
C. Secret-text
D. None of the above
Answer» A. Ciphertext
6.

Which of the following is not a type of virus?

A. Boot sector
B. Polymorphi
C. C Multipartite
D. Troj
Answer» A. Boot sector
7.

A computer ________ is a malicious code which self-replicates by copying itself to other programs.

A. Program
B. Virus
C. Application
D. Worm
Answer» B. Virus
8.

_______________ infects the master boot record and it is challenging and a complex task to remove this virus.

A. Boot Sector Virus
B. Polymorphi
C. C Multipartite
D. Troj
Answer» A. Boot Sector Virus
9.

______________ infects the executable as well as the boot sectors.

A. Non-resident virus
B. Boot Sector Virus
C. Polymorphic Virus
D. Multipartite Virus
Answer» D. Multipartite Virus
10.

Trojan creators do not look for _______________.

A. Deleting Data
B. Protecting Data
C. Modifying Data
D. Copying Data
Answer» B. Protecting Data
11.

Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system.

A. Virus, Cyber-Criminals
B. Malware, Penetration Testers
C. Trojans, Cyber-Criminals
D. Virus, Penetration Testers
Answer» C. Trojans, Cyber-Criminals
12.

During a DOS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted.

A. Network
B. System
C. Website
D. Router
Answer» C. Website
13.

The intent of a __________ is to overkill the targeted server’s bandwidth and other resources of the target website.

A. Phishing attack
B. DoS attack
C. Website attack
D. MiTM attack
Answer» B. DoS attack
14.

In ________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware.

A. URL Redirection
B. DOS
C. Phishing
D. MiTM attack
Answer» C. Phishing
15.

Trojan creators do not look for _______________.

A. Credit card information
B. Confidential data
C. Important documents
D. Securing systems with such programs
Answer» D. Securing systems with such programs
16.

1. When one participant in a communication pretends to be someone else, it is called _________?

A. Virus Attacks
B. Fire Attacks
C. Data Driven Attacks
D. Masquerade
Answer» D. Masquerade
17.

________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities.

A. Message Authentication Code
B. Steganography
C. Whale phishing
D. A cipher
Answer» C. Whale phishing
18.

Compromising confidential information comes under _________.

A. Bug
B. Threat
C. Vulnerability
D. Attack
Answer» B. Threat
19.

When an attacker sends unsolicited communication, it is an example of_____.

A. Spoofing
B. Spamming
C. Crackers
D. Sniffers
Answer» B. Spamming
20.

Masquerading is _______.

A. Attempting to hack a system through backdoors to an operating system or application.
B. Pretending to be an authorized user
C. Always done through IP spoofing
D. Applying a subnet mask to an internal IP range
Answer» B. Pretending to be an authorized user
21.

Integrity is protection of data from all of the following except ________.

A. Unauthorized changes
B. Accidental changes
C. Data analysis
D. Intentional manipulation
Answer» C. Data analysis
22.

A security program cannot address which of the following business goals?

A. Accuracy of information
B. Change control
C. User expectations
D. Prevention of fraud
Answer» A. Accuracy of information
23.

The absence of a fire-suppression system would be best characterized as_______.

A. Exposure
B. Threat
C. Vulnerability
D. Risk
Answer» C. Vulnerability
24.

Asymmetric key cryptography is used for all of the following except_______.

A. Encryption of data
B. Access control
C. Nonrepudiation
D. Steganography
Answer» D. Steganography
25.

Firewalls are to protect against________.

A. Virus Attacks
B. Fire Attacks
C. Data Driven Attacks
D. Unauthorized Attacks
Answer» D. Unauthorized Attacks
26.

The first computer virus is__________.

A. The famous
B. HARLIE
C. PARAM
D. Creeper
Answer» D. Creeper
27.

_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.

A. Network Security
B. Database Security
C. Information Security
D. Physical Security
Answer» C. Information Security
28.

From the options below, which of them is not a vulnerability to information security?

A. Without deleting data, disposal of storage media
B. Latest patches and updates not done
C. Floo
D. D Unchanged default password
Answer» C. Floo
29.

Possible threat to any information cannot be ________________.

A. Ignored
B. Protected
C. Transferre
D. D Reduced
Answer» A. Ignored
30.

A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.

A. Security officer
B. Malicious hacker
C. Security auditor
D. Network analyst
Answer» B. Malicious hacker
31.

_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa.

A. Malware Analysis
B. Exploit writing
C. Reverse engineering
D. Cryptography
Answer» D. Cryptography
32.

When plain text is converted to unreadable format, it is termed as _____________.

A. Rotten text
B. Raw text
C. Cipher-text
D. Cipher
Answer» C. Cipher-text
33.

______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it.

A. Malware Analysis
B. Cryptography
C. Reverse engineering
D. Exploit writing
Answer» B. Cryptography
34.

Cryptography can be divided into ______ types.

A. 5
B. 2
C. 7
D. 3
Answer» B. 2
35.

Data which is easily readable & understandable without any special algorithm or method is called _________________.

A. Cipher-text
B. Plain text
C. Raw text
D. Encrypted text
Answer» B. Plain text
36.

Plain text are also called _____________.

A. Encrypted text
B. Clear-text
C. Raw text
D. Cipher-text
Answer» C. Raw text
37.

There are ________ types of cryptographic techniques used in general.

A. 2
B. 3
C. 4
D. 5
Answer» B. 3
38.

Conventional cryptography is also known as _____________ or symmetric-key encryption.

A. Secret-key
B. Public key
C. Protected key
D. Primary key
Answer» A. Secret-key
39.

Data Encryption Standard is an example of a _____________ cryptosystem.

A. Conventional
B. Public key
C. Hash key
D. Asymmetric-key
Answer» A. Conventional
40.

_______ Cryptography deals with traditional characters, i.e., letters & digits directly.

A. Latest
B. Asymmetri
C. C Classic
D. Modern
Answer» C. C Classic
41.

____________ Cryptography operates on binary-bit series and strings.

A. Modern
B. Classi
C. C Traditional
D. Primitive
Answer» A. Modern
42.

____________ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text.

A. Polyalphabetic Cipher
B. Caesar Cipher
C. Playfair Cipher
D. Monoalphabetic Cipher
Answer» B. Caesar Cipher
43.

________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.

A. Rolling Cipher
B. Shift Cipher
C. Playfair Cipher
D. Block Cipher
Answer» B. Shift Cipher
44.

In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.

A. Rolling Cipher
B. Shift Cipher
C. Playfair Cipher
D. Block Cipher
Answer» C. Playfair Cipher
45.

______________ employs a text string as a key that is implemented to do a series of shifts on the plain-text.

A. Shift Cipher
B. Block Cipher
C. Playfair Cipher
D. Vigenere Cipher
Answer» D. Vigenere Cipher
46.

The ________________ has piece of the keyword that has the same length as that of the plaintext.

A. One-time pad
B. Hash functions
C. Vigenere Cipher
D. Block Cipher
Answer» A. One-time pad
47.

In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.

A. Vigenere Cipher
B. Block Cipher
C. Stream cipher
D. One-time pad
Answer» C. Stream cipher
48.

In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.

A. Hash functions
B. Vigenere Cipher
C. One-time pa
D. D Block Cipher
Answer» D. D Block Cipher
49.

The procedure to add bits to the last block is termed as _________________.

A. Padding
B. Hashing
C. Tuning
D. Decryption
Answer» A. Padding
50.

Which of the following is not an example of a block cipher?

A. DES
B. Caesar cipher
C. Twofish
D. IDEA
Answer» B. Caesar cipher
51.

DES stands for ________________.

A. Device Encryption Standard
B. Data Encrypted Standard
C. Data Encryption Security
D. Data Encryption Standard
Answer» D. Data Encryption Standard
52.

____________ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.

A. Twofish
B. IDEA
C. DES
D. AES
Answer» D. AES
53.

AES stands for ________________.

A. Active Encryption Standard
B. Advanced Encrypted Standard
C. Advanced Encryption Standar
D. D Advanced Encryption Security
Answer» C. Advanced Encryption Standar
54.

AES is at least 6-times faster than 3-DES.

A. True
B. False
C. none
D. all
Answer» A. True
55.

_____________ is another data hiding technique which can be used in conjunction with cryptography for the extra-secure method of protecting data.

A. Chorography
B. Tomography
C. Steganography
D. Cryptography
Answer» C. Steganography
56.

_____________ is hiding of data within data, where we can hide images, text, and other messages within images, videos, music or recording files.

A. Steganography
B. Cryptography
C. Chorography
D. Tomography
Answer» A. Steganography
57.

Steganography follows the concept of security through obscurity.

A. True
B. False
C. none
D. all
Answer» A. True
58.

The word ________________is a combination of the Greek words ‘steganos’ which means “covered or concealed”, and ‘graphein’ which means “writing”.

A. Tomography
B. Chorography
C. Steganography
D. Cryptography
Answer» C. Steganography
59.

Which of the following is not a steganography tool?

A. Steghide
B. ReaperExploit
C. Image steganography
D. Xaio steganography
Answer» B. ReaperExploit
60.

Which of the following is not a steganography tool?

A. rSteg
B. Crypture
C. SteganographX Plus
D. Burp Suite
Answer» D. Burp Suite
61.

The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.

A. Program file
B. Special file
C. Ordinary file
D. Encrypted file
Answer» C. Ordinary file
62.

People will normally think it as a normal/regular file and your secret message will pass on without any _______________.

A. Cracking
B. Encryption
C. Suspicion
D. Decryption
Answer» C. Suspicion
63.

By using ______________ you can diminish the chance of data leakage.

A. Steganography
B. Chorography
C. Tomography
D. Cryptography
Answer» A. Steganography
64.

Which mode of operation has the worst “error propagation” among the following?

A. EC
B. B CB
C. C CBC
D. OFB
Answer» A. EC
65.

Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution?

A. EC
B. B CB
C. C CTR
D. OFB
Answer» C. C CTR
66.

Which mode requires the implementation of only the encryption algorithm?

A. OF
B. B CTR
C. CBC
D. ECB
Answer» B. B CTR
67.

Which of the following modes of operation does not involve feedback?

A. OF
B. B CTR
C. CBC
D. ECB
Answer» A. OF
68.

Which of the following is a natural candidates for stream ciphers?

A. OFB
B. ECB
C. CBC
D. CFB
Answer» A. OFB
69.

Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?

A. Rijndael
B. Serpent
C. Blowfish
D. JUPITER
Answer» D. JUPITER
70.

Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES algorithm?

A. Rijndael
B. RC6
C. Blowfish
D. MARS
Answer» D. MARS
71.

How many rounds does the AES-192 perform?

A. 16
B. 12
C. 14
D. 10
Answer» B. 12
72.

What is the expanded key size of AES-192?

A. 60 words
B. 32 words
C. 52 words
D. 44 words
Answer» C. 52 words
73.

The 4×4 byte matrices in the AES algorithm are called_______.

A. Permutations
B. Transitions
C. Words
D. States
Answer» D. States
74.

In AES the 4×4 bytes matrix key is transformed into a keys of size __________.

A. 60 words
B. 32 words
C. 52 words
D. 44 words
Answer» D. 44 words
75.

For the AES-128 algorithm there are __________ similar rounds and _________ round is different.

A. 9 ; the last
B. 8 ; the first and last
C. 10 ; no
D. 2 pair of 5 similar rounds ; every alternate
Answer» A. 9 ; the last
76.

There is an addition of round key before the start of the AES round algorithms.

A. True
B. False
C. none
D. all
Answer» A. True
77.

How many computation rounds does the simplified AES consists of?

A. 10
B. 8
C. 2
D. 5
Answer» C. 2
78.

On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?

A. Permutation P
B. Swapping of halves
C. XOR of subkey with function f
D. F function
Answer» B. Swapping of halves
79.

What is the block size in the Simplified AES algorithm?

A. 36 bits
B. 16 bits
C. 40 bits
D. 8 bits
Answer» C. 40 bits
80.

What is the key size in the S-AES algorithm?

A. 32 bits
B. 24 bits
C. 16 bits
D. None of the mentioned
Answer» C. 16 bits
81.

Which of the following is a faulty S-AES step function?

A. Mix Columns
B. Add round key
C. Byte substitution
D. Shift rows
Answer» C. Byte substitution
82.

How many step function do Round 1 and 2 each have in S-AES?

A. 1 and 4
B. 3 and 4
C. Both 4
D. 4 and 3
Answer» D. 4 and 3
83.

The inverse transformation matrix times the forward transformation matrix equals the identity matrix.

A. True
B. False
C. none
D. all
Answer» A. True
84.

How many round keys are generated in the AES algorithm?

A. 12
B. 11
C. 10
D. 8
Answer» B. 11
85.

DES follows_________.

A. SP Networks
B. Feistel Cipher Structure
C. Caesars Cipher
D. Hash Algorithm
Answer» B. Feistel Cipher Structure
86.

The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.

A. 16
B. 9
C. 12
D. 18
Answer» A. 16
87.

The DES algorithm has a key length of ______.

A. 16 Bits
B. 32 Bits
C. 64 Bits
D. 128 Bits
Answer» C. 64 Bits
88.

In the DES algorithm the round key is __________ bit and the Round Input is ____________bits.

A. 48, 32
B. 32, 32
C. 56, 24
D. 64,32
Answer» A. 48, 32
89.

In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________.

A. Addition of ones
B. Addition of zeros
C. Duplication of the existing bits
D. Scaling of the existing bits
Answer» D. Scaling of the existing bits
90.

The Initial Permutation table/matrix is of size _____.

A. 4×8
B. 8×8
C. 12×8
D. 16×8
Answer» B. 8×8
91.

The number of unique substitution boxes in DES after the 48 bit XOR operation are___.

A. 4
B. 8
C. 12
D. 16
Answer» B. 8
92.

What is the number of possible 3 x 3 affine cipher transformations?

A. 840
B. 168
C. 1344
D. 1024
Answer» C. 1344
93.

The S-Box is used to provide confusion, as it is dependent on the unknown key.

A. True
B. False
C. none
D. all
Answer» A. True
94.

For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find the CT.

A. 64
B. 11
C. 54
D. 23
Answer» B. 11
95.

For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Cipher message=11 and thus find the plain text.

A. 122
B. 143
C. 111
D. 88
Answer» D. 88
96.

In an RSA system the public key of a given user is e = 31, n = 3599. What is the private key of this user?

A. 1023
B. 2432
C. 2412
D. 3031
Answer» D. 3031
97.

Compute private key (d, p, q) given public key (e=23, n=233 ´ 241=56,153).

A. 32432
B. 19367
C. 12543
D. 35212
Answer» B. 19367
98.

RSA is also a stream cipher like Merkel-Hellman.

A. True
B. False
C. none
D. all
Answer» A. True
99.

In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?

A. p/q should give no remainder
B. p and q should be prime
C. p and q should be co-prime
D. p and q should be divisible by Ф(n)
Answer» B. p and q should be prime
100.

In RSA, Ф(n) = _______ in terms of p and q.

A. (p+1)(q+1)
B. (p-1)(q-1)
C. (p)(q)
D. (p)/(q)
Answer» B. (p-1)(q-1)
Tags
Question and answers in Information and Network Security, Information and Network Security multiple choice questions and answers, Information and Network Security Important MCQs, Solved MCQs for Information and Network Security, Information and Network Security MCQs with answers PDF download