

McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Uncategorized topics .
101. |
In Elgamal cryptosystem, given the prime p=31,What is the respective plaintext character for C = (27, 20)? |
A. | h |
B. | l |
C. | o |
D. | m |
Answer» A. h |
102. |
How many real and imaginary roots does the equation y2=x3-1 have |
A. | 2 real, 1 imaginary |
B. | all real |
C. | all imaginary |
D. | 2 imaginary, 1 real |
Answer» D. 2 imaginary, 1 real |
103. |
“In ECC, the inverse of point P =(x1, y1) is Q = (-x1, y1). “ |
A. | true |
B. | false |
Answer» B. false |
104. |
In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is P + Q if P = (0,-4) and Q = (1, 0)? |
A. | (15, -56) |
B. | (-23, -43) |
C. | (69, 26) |
D. | (12, -86) |
Answer» A. (15, -56) |
105. |
How many real and imaginary roots does the equation y2=x3-4x have |
A. | 2 real, 1 imaginary |
B. | all real |
C. | all imaginary |
D. | 2 imaginary, 1 real |
Answer» B. all real |
106. |
In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is 2P if P = (4, 3.464) |
A. | (12.022, -39.362) |
B. | (32.022, 42.249) |
C. | (11.694, -43.723) |
D. | (43.022, 39.362) |
Answer» A. (12.022, -39.362) |
107. |
In public key cryptosystem keys are used for encryption and decryption. |
A. | same |
B. | different |
C. | encryption keys |
D. | none of the mentioned |
Answer» B. different |
108. |
PGP system uses |
A. | private key system |
B. | public key system |
C. | private & public key system |
D. | none of the mentioned |
Answer» C. private & public key system |
109. |
Knapsack problem can be solved by |
A. | public key cryptosystem |
B. | public key system |
C. | private & public key system |
D. | none of the mentioned |
Answer» A. public key cryptosystem |
110. |
Merkle hellman is a symmetric cryptosystem. |
A. | true |
B. | false |
Answer» B. false |
111. |
In public key cryptosystem which is kept as public? |
A. | encryption keys |
B. | decryption keys |
C. | encryption & decryption keys |
D. | none of the mentioned |
Answer» A. encryption keys |
112. |
A cryptographic hash function has variable output length. |
A. | true |
B. | false |
Answer» B. false |
113. |
In a trapdoor function, the functions are easy to go in |
A. | one direction |
B. | two directions |
C. | all directions |
D. | none of the mentioned |
Answer» A. one direction |
114. |
Which algorithm can be used to sign a message? |
A. | public key algorithm |
B. | private key algorith |
C. | public & private key algorithm |
D. | none of the mentioned |
Answer» A. public key algorithm |
115. |
In this Merkle Hellman method same key is used for encryption and decryption. |
A. | true |
B. | false |
Answer» B. false |
116. |
A set of numbers is called as super increasing if |
A. | each element is greater than previous element |
B. | each element greater than sum of all the previous elements |
C. | each element greater than the average of all elements |
D. | each element lesser than the sum of all the elements |
Answer» B. each element greater than sum of all the previous elements |
117. |
There are major ways of stealing email information. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 |
118. |
Which of them is not a major way of stealing email information? |
A. | stealing cookies |
B. | reverse engineering |
C. | password phishing |
D. | social engineering |
Answer» B. reverse engineering |
119. |
is the method for keeping sensitive information in email communication & accounts secure against unofficial access, loss, or compromise. |
A. | email security |
B. | email hacking |
C. | email protection |
D. | email safeguarding |
Answer» A. email security |
120. |
is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks. |
A. | cloud |
B. | pen drive |
C. | website |
D. | |
Answer» D. email |
121. |
Fraudulent email messages are some fake email messages that seem legitimate which asks for your confidential bank details such as details and passwords. |
A. | credit card, antivirus name |
B. | credit card, login id |
C. | cell phone, antivirus name |
D. | car model, account id |
Answer» B. credit card, login id |
122. |
Unsolicited Bulk E-mails (UBI) are called |
A. | sms |
B. | mms |
C. | spam emails |
D. | malicious emails |
Answer» C. spam emails |
123. |
Using email hacking illicit hackers can send & spread virus and spam emails. |
A. | trojans, redirected malicious urls |
B. | antivirus, patches |
C. | cracked software, redirected malicious urls |
D. | malware, security patches |
Answer» A. trojans, redirected malicious urls |
124. |
is the technique used for tricking users to disclose their username and passwords through fake pages. |
A. | social engineering |
B. | phishing |
C. | cookie stealing |
D. | banner grabbing |
Answer» B. phishing |
125. |
Which of them is an example of grabbing email information? |
A. | cookie stealing |
B. | reverse engineering |
C. | port scanning |
D. | banner grabbing |
Answer» A. cookie stealing |
126. |
Which of the following is a non-technical type of intrusion or attack technique? |
A. | reverse engineering |
B. | malware analysis |
C. | social engineering |
D. | malware writing |
Answer» C. social engineering |
127. |
If the data stored in the is not encrypted, then after cookie stealing, attackers can see information such as username and password stored by the cookie. |
A. | memory |
B. | quarantine |
C. | cookies |
D. | hard drive |
Answer» C. cookies |
128. |
The stored cookie which contains all your personal data about that website can be stolen away by using or trojans. |
A. | attackers, malware |
B. | hackers, antivirus |
C. | penetration testers, malware |
D. | penetration testers, virus |
Answer» A. attackers, malware |
129. |
If a website uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website. |
A. | true |
B. | false |
Answer» A. true |
130. |
Which of them is not a proper method for email security? |
A. | use strong password |
B. | use email encryption |
C. | spam filters and malware scanners |
D. | click on unknown links to explore |
Answer» D. click on unknown links to explore |
131. |
What are email security services? |
A. | confidentiality |
B. | authentication |
C. | non-repudation of origin |
D. | all of the above |
Answer» D. all of the above |
132. |
PGP security system uses |
A. | public key cryptosystem |
B. | private key cryptosystem |
C. | public & private key cryptosystem |
D. | none of the mentioned |
Answer» C. public & private key cryptosystem |
133. |
What is the key size allowed in PGP? |
A. | 1024-1056 |
B. | 1024-4056 |
C. | 1024-4096 |
D. | 1024-2048 |
Answer» C. 1024-4096 |
134. |
Who created PGP? |
A. | phil zimmermann |
B. | tim berners-lee |
C. | marc andreessen |
D. | ken thompson |
Answer» A. phil zimmermann |
135. |
What is the PGP stand for? |
A. | permuted gap permission |
B. | permuted great privacy |
C. | pretty good privacy |
D. | none of the mentioned |
Answer» C. pretty good privacy |
136. |
PGP makes use of which cryptographic algorithm? |
A. | des |
B. | aes |
C. | rsa |
D. | rabin |
Answer» C. rsa |
137. |
PGP offers block ciphers for message encryption? |
A. | triple-des |
B. | cast |
C. | idea |
D. | all of the above |
Answer» D. all of the above |
138. |
S/MIME stands for . |
A. | standard multipurpose internet mail extensions. |
B. | secure multipurpose internet mail extensions. |
C. | secure multipurpose international mail extensions |
D. | standard multipurpose international mail extensions. |
Answer» B. secure multipurpose internet mail extensions. |
139. |
is used for hiding the payment information from the merchant. |
A. | set. |
B. | ssl. |
C. | shttp |
D. | tsp |
Answer» A. set. |
140. |
The cryptography algorithms used in S/MIME are . |
A. | idea. |
B. | rc4 |
C. | rsa,des-3 |
D. | rc5 |
Answer» C. rsa,des-3 |
141. |
In S/MIME,MLA stands for . |
A. | mailing list agent. |
B. | multipurpose list agent. |
C. | mail lock agent. |
D. | message link agen |
Answer» A. mailing list agent. |
142. |
Which component is included in IP security? |
A. | authentication header (ah) |
B. | encapsulating security payload (esp) |
C. | internet key exchange (ike) |
D. | all of the mentioned |
Answer» A. authentication header (ah) |
143. |
WPA2 is used for security in |
A. | ethernet |
B. | bluetooth |
C. | wi-fi |
D. | |
Answer» C. wi-fi |
144. |
An attempt to make a computer resource unavailable to its intended users is called |
A. | denial-of-service attack |
B. | virus attack |
C. | worms attack |
D. | botnet process |
Answer» A. denial-of-service attack |
145. |
PGP is used in |
A. | browser security |
B. | email security |
C. | ftp security |
D. | wifi security |
Answer» B. email security |
146. |
In tunnel mode, IPSec protects the |
A. | entire ip packet |
B. | ip header |
C. | ip payload |
D. | ip trailer |
Answer» A. entire ip packet |
147. |
IPSec is designed to provide security at the |
A. | transport layer |
B. | network layer |
C. | application layer |
D. | session layer |
Answer» B. network layer |
148. |
Which of the following is not a strong security protocol? |
A. | https |
B. | ssl |
C. | smtp |
D. | sftp |
Answer» C. smtp |
149. |
SSL primarily focuses on |
A. | integrity and authenticity |
B. | integrity and non-repudiation |
C. | authenticity and privacy |
D. | confidentiality and integrity |
Answer» A. integrity and authenticity |
150. |
Why did SSL certificate require in HTTP? |
A. | for making security weak |
B. | for making information move faster |
C. | for encrypted data sent over http protocol |
D. | for sending and receiving emails unencrypted |
Answer» C. for encrypted data sent over http protocol |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.