McqMate
These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Computer Science Engineering (CSE) , Information Technology Engineering (IT) .
1. |
An algorithm in encryption is called _____________. |
A. | Algorithm |
B. | Procedure |
C. | Cipher |
D. | Module |
Answer» C. Cipher |
2. |
The information that gets transformed in encryption is ____________. |
A. | Plain text |
B. | Parallel text |
C. | Encrypted text |
D. | Decrypted text |
Answer» A. Plain text |
3. |
In brute force attack, on average half of all possible keys must be tried to achieve success. |
A. | True |
B. | False |
C. | none |
D. | all |
Answer» A. True |
4. |
A (n) ______ algorithm transforms ciphertext to plaintext. |
A. | Encryption |
B. | Decryption |
C. | Either (a) or (b) |
D. | Neither (a) nor (b) |
Answer» B. Decryption |
5. |
The ________ is the message after transformation. |
A. | Ciphertext |
B. | Plaintext |
C. | Secret-text |
D. | None of the above |
Answer» A. Ciphertext |
6. |
Which of the following is not a type of virus? |
A. | Boot sector |
B. | Polymorphi |
C. | C Multipartite |
D. | Troj |
Answer» A. Boot sector |
7. |
A computer ________ is a malicious code which self-replicates by copying itself to other programs. |
A. | Program |
B. | Virus |
C. | Application |
D. | Worm |
Answer» B. Virus |
8. |
_______________ infects the master boot record and it is challenging and a complex task to remove this virus. |
A. | Boot Sector Virus |
B. | Polymorphi |
C. | C Multipartite |
D. | Troj |
Answer» A. Boot Sector Virus |
9. |
______________ infects the executable as well as the boot sectors. |
A. | Non-resident virus |
B. | Boot Sector Virus |
C. | Polymorphic Virus |
D. | Multipartite Virus |
Answer» D. Multipartite Virus |
10. |
Trojan creators do not look for _______________. |
A. | Deleting Data |
B. | Protecting Data |
C. | Modifying Data |
D. | Copying Data |
Answer» B. Protecting Data |
11. |
Once activated __________ can enable ____________to spy on the victim, steal their sensitive information & gain backdoor access to the system. |
A. | Virus, Cyber-Criminals |
B. | Malware, Penetration Testers |
C. | Trojans, Cyber-Criminals |
D. | Virus, Penetration Testers |
Answer» C. Trojans, Cyber-Criminals |
12. |
During a DOS attack, the regular traffic on the target _____________ will be either dawdling down or entirely interrupted. |
A. | Network |
B. | System |
C. | Website |
D. | Router |
Answer» C. Website |
13. |
The intent of a __________ is to overkill the targeted server’s bandwidth and other resources of the target website. |
A. | Phishing attack |
B. | DoS attack |
C. | Website attack |
D. | MiTM attack |
Answer» B. DoS attack |
14. |
In ________ some cyber-criminals redirect the legitimate users to different phishing sites and web pages via emails, IMs, ads and spyware. |
A. | URL Redirection |
B. | DOS |
C. | Phishing |
D. | MiTM attack |
Answer» C. Phishing |
15. |
Trojan creators do not look for _______________. |
A. | Credit card information |
B. | Confidential data |
C. | Important documents |
D. | Securing systems with such programs |
Answer» D. Securing systems with such programs |
16. |
1. When one participant in a communication pretends to be someone else, it is called _________? |
A. | Virus Attacks |
B. | Fire Attacks |
C. | Data Driven Attacks |
D. | Masquerade |
Answer» D. Masquerade |
17. |
________ is a term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals. Generally CEO’s and important celebrities. |
A. | Message Authentication Code |
B. | Steganography |
C. | Whale phishing |
D. | A cipher |
Answer» C. Whale phishing |
18. |
Compromising confidential information comes under _________. |
A. | Bug |
B. | Threat |
C. | Vulnerability |
D. | Attack |
Answer» B. Threat |
19. |
When an attacker sends unsolicited communication, it is an example of_____. |
A. | Spoofing |
B. | Spamming |
C. | Crackers |
D. | Sniffers |
Answer» B. Spamming |
20. |
Masquerading is _______. |
A. | Attempting to hack a system through backdoors to an operating system or application. |
B. | Pretending to be an authorized user |
C. | Always done through IP spoofing |
D. | Applying a subnet mask to an internal IP range |
Answer» B. Pretending to be an authorized user |
21. |
Integrity is protection of data from all of the following except ________. |
A. | Unauthorized changes |
B. | Accidental changes |
C. | Data analysis |
D. | Intentional manipulation |
Answer» C. Data analysis |
22. |
A security program cannot address which of the following business goals? |
A. | Accuracy of information |
B. | Change control |
C. | User expectations |
D. | Prevention of fraud |
Answer» A. Accuracy of information |
23. |
The absence of a fire-suppression system would be best characterized as_______. |
A. | Exposure |
B. | Threat |
C. | Vulnerability |
D. | Risk |
Answer» C. Vulnerability |
24. |
Asymmetric key cryptography is used for all of the following except_______. |
A. | Encryption of data |
B. | Access control |
C. | Nonrepudiation |
D. | Steganography |
Answer» D. Steganography |
25. |
Firewalls are to protect against________. |
A. | Virus Attacks |
B. | Fire Attacks |
C. | Data Driven Attacks |
D. | Unauthorized Attacks |
Answer» D. Unauthorized Attacks |
26. |
The first computer virus is__________. |
A. | The famous |
B. | HARLIE |
C. | PARAM |
D. | Creeper |
Answer» D. Creeper |
27. |
_______ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction. |
A. | Network Security |
B. | Database Security |
C. | Information Security |
D. | Physical Security |
Answer» C. Information Security |
28. |
From the options below, which of them is not a vulnerability to information security? |
A. | Without deleting data, disposal of storage media |
B. | Latest patches and updates not done |
C. | Floo |
D. | D Unchanged default password |
Answer» C. Floo |
29. |
Possible threat to any information cannot be ________________. |
A. | Ignored |
B. | Protected |
C. | Transferre |
D. | D Reduced |
Answer» A. Ignored |
30. |
A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase. |
A. | Security officer |
B. | Malicious hacker |
C. | Security auditor |
D. | Network analyst |
Answer» B. Malicious hacker |
31. |
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. |
A. | Malware Analysis |
B. | Exploit writing |
C. | Reverse engineering |
D. | Cryptography |
Answer» D. Cryptography |
32. |
When plain text is converted to unreadable format, it is termed as _____________. |
A. | Rotten text |
B. | Raw text |
C. | Cipher-text |
D. | Cipher |
Answer» C. Cipher-text |
33. |
______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it. |
A. | Malware Analysis |
B. | Cryptography |
C. | Reverse engineering |
D. | Exploit writing |
Answer» B. Cryptography |
34. |
Cryptography can be divided into ______ types. |
A. | 5 |
B. | 2 |
C. | 7 |
D. | 3 |
Answer» B. 2 |
35. |
Data which is easily readable & understandable without any special algorithm or method is called _________________. |
A. | Cipher-text |
B. | Plain text |
C. | Raw text |
D. | Encrypted text |
Answer» B. Plain text |
36. |
Plain text are also called _____________. |
A. | Encrypted text |
B. | Clear-text |
C. | Raw text |
D. | Cipher-text |
Answer» C. Raw text |
37. |
There are ________ types of cryptographic techniques used in general. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 |
38. |
Conventional cryptography is also known as _____________ or symmetric-key encryption. |
A. | Secret-key |
B. | Public key |
C. | Protected key |
D. | Primary key |
Answer» A. Secret-key |
39. |
Data Encryption Standard is an example of a _____________ cryptosystem. |
A. | Conventional |
B. | Public key |
C. | Hash key |
D. | Asymmetric-key |
Answer» A. Conventional |
40. |
_______ Cryptography deals with traditional characters, i.e., letters & digits directly. |
A. | Latest |
B. | Asymmetri |
C. | C Classic |
D. | Modern |
Answer» C. C Classic |
41. |
____________ Cryptography operates on binary-bit series and strings. |
A. | Modern |
B. | Classi |
C. | C Traditional |
D. | Primitive |
Answer» A. Modern |
42. |
____________ is a mono-alphabetic encryption code wherein each & every letter of plaintext is replaced by another letter in creating the cipher-text. |
A. | Polyalphabetic Cipher |
B. | Caesar Cipher |
C. | Playfair Cipher |
D. | Monoalphabetic Cipher |
Answer» B. Caesar Cipher |
43. |
________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity. |
A. | Rolling Cipher |
B. | Shift Cipher |
C. | Playfair Cipher |
D. | Block Cipher |
Answer» B. Shift Cipher |
44. |
In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext. |
A. | Rolling Cipher |
B. | Shift Cipher |
C. | Playfair Cipher |
D. | Block Cipher |
Answer» C. Playfair Cipher |
45. |
______________ employs a text string as a key that is implemented to do a series of shifts on the plain-text. |
A. | Shift Cipher |
B. | Block Cipher |
C. | Playfair Cipher |
D. | Vigenere Cipher |
Answer» D. Vigenere Cipher |
46. |
The ________________ has piece of the keyword that has the same length as that of the plaintext. |
A. | One-time pad |
B. | Hash functions |
C. | Vigenere Cipher |
D. | Block Cipher |
Answer» A. One-time pad |
47. |
In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text. |
A. | Vigenere Cipher |
B. | Block Cipher |
C. | Stream cipher |
D. | One-time pad |
Answer» C. Stream cipher |
48. |
In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits. |
A. | Hash functions |
B. | Vigenere Cipher |
C. | One-time pa |
D. | D Block Cipher |
Answer» D. D Block Cipher |
49. |
The procedure to add bits to the last block is termed as _________________. |
A. | Padding |
B. | Hashing |
C. | Tuning |
D. | Decryption |
Answer» A. Padding |
50. |
Which of the following is not an example of a block cipher? |
A. | DES |
B. | Caesar cipher |
C. | Twofish |
D. | IDEA |
Answer» B. Caesar cipher |
Done Studing? Take A Test.
Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.