![Mcqmate logo](https://mcqmate.com/public/images/logos/logo-black.png)
![Mcqmate logo](https://mcqmate.com/public/images/logos/logo-white.png)
McqMate
101. |
When you use the word ______it means you are protecting your data from getting disclosed. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | availability |
Answer» A. confidentiality |
102. |
_______ means the protection of data from modification by unknown users. |
A. | confidentiality |
B. | integrity |
C. | authentication |
D. | non-repudiation |
Answer» B. integrity |
103. |
_______ of information means, only authorized users are capable of accessing the information. |
A. | confidentiality |
B. | integrity |
C. | non-repudiation |
D. | availability |
Answer» D. availability |
104. |
This helps in identifying the origin of information and authentic user. This referred to here as __________ |
A. | confidentiality |
B. | integrity |
C. | authenticity |
D. | availability |
Answer» C. authenticity |
105. |
Data ___________ is used to ensure confidentiality. |
A. | encryption |
B. | locking |
C. | decryption |
D. | backup |
Answer» A. encryption |
106. |
What does OSI stand for in the OSI Security Architecure? |
A. | open system interface |
B. | open systems interconnections |
C. | open source initiative |
D. | open standard interconnections |
Answer» B. open systems interconnections |
107. |
A company requires its users to change passwords every month. This improves the ________ of the network. |
A. | performance |
B. | reliability |
C. | security |
D. | none of the above |
Answer» C. security |
108. |
Release of message contents and Traffic analysis are two types of _________ attacks. |
A. | active attack |
B. | modification of attack |
C. | passive attack |
D. | dos attack |
Answer» C. passive attack |
109. |
The ________ is encrypted text. |
A. | cipher scricpt |
B. | cipher text |
C. | secret text |
D. | secret script |
Answer» B. cipher text |
110. |
What type of attack uses a fraudulent server with a relay address? |
A. | ntlm |
B. | mitm |
C. | netbios |
D. | smb |
Answer» B. mitm |
111. |
Which of the following Algorithms not belong to symmetric encryption |
A. | 3des (tripledes) |
B. | rsa |
C. | rc5 |
D. | idea |
Answer» B. rsa |
112. |
Which is the largest disadvantage of the symmetric Encryption? |
A. | more complex and therefore more time-consuming calculations. |
B. | problem of the secure transmission of the secret key. |
C. | less secure encryption function. |
D. | isn\t used any more. |
Answer» B. problem of the secure transmission of the secret key. |
113. |
In cryptography, what is cipher? |
A. | algorithm for performing encryption and decryption |
B. | encrypted message |
C. | both algorithm for performing encryption and decryption and encrypted message |
D. | decrypted message |
Answer» A. algorithm for performing encryption and decryption |
114. |
In asymmetric key cryptography, the private key is kept by __________ |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | all the connected devices to the network |
Answer» B. receiver |
115. |
Which one of the following algorithm is not used in asymmetric-key cryptography? |
A. | rsa algorithm |
B. | diffie-hellman algorithm |
C. | electronic code book algorithm |
D. | dsa algorithm |
Answer» C. electronic code book algorithm |
116. |
In cryptography, the order of the letters in a message is rearranged by __________ |
A. | transpositional ciphers |
B. | substitution ciphers |
C. | both transpositional ciphers and substitution ciphers |
D. | quadratic ciphers |
Answer» A. transpositional ciphers |
117. |
What is data encryption standard (DES)? |
A. | block cipher |
B. | stream cipher |
C. | bit cipher |
D. | byte cipher |
Answer» A. block cipher |
118. |
A asymmetric-key (or public key ) cipher uses |
A. | 1 key |
B. | 2 key |
C. | 3 key |
D. | 4 key |
Answer» B. 2 key |
119. |
In asymmetric key cryptography, the two keys e and d, have special relationship to |
A. | others |
B. | data |
C. | keys |
D. | each other |
Answer» D. each other |
120. |
_________________ is the process or mechanism used for converting ordinary plain text into garbled non-human readable text & vice-versa. |
A. | malware analysis |
B. | exploit writing |
C. | reverse engineering |
D. | cryptography |
Answer» D. cryptography |
121. |
______________ is a means of storing & transmitting information in a specific format so that only those for whom it is planned can understand or process it. |
A. | malware analysis |
B. | cryptography |
C. | reverse engineering |
D. | exploit writing |
Answer» B. cryptography |
122. |
Cryptographic algorithms are based on mathematical algorithms where these algorithms use ___________ for a secure transformation of data. |
A. | secret key |
B. | external programs |
C. | add-ons |
D. | secondary key |
Answer» A. secret key |
123. |
Conventional cryptography is also known as _____________ or symmetric-key encryption. |
A. | secret-key |
B. | public key |
C. | protected key |
D. | primary key |
Answer» A. secret-key |
124. |
The procedure to add bits to the last block is termed as _________________ |
A. | decryption |
B. | hashing |
C. | tuning |
D. | padding |
Answer» D. padding |
125. |
How many rounds does the AES-192 perform? |
A. | 10 |
B. | 12 |
C. | 14 |
D. | 16 |
Answer» B. 12 |
126. |
ECC encryption system is __________ |
A. | symmetric key encryption algorithm |
B. | asymmetric key encryption algorithm |
C. | not an encryption algorithm |
D. | block cipher method |
Answer» B. asymmetric key encryption algorithm |
127. |
________function creates a message digest out of a message. |
A. | encryption |
B. | decryption |
C. | hash |
D. | none of the above |
Answer» C. hash |
128. |
Extensions to the X.509 certificates were added in version ____ |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» C. 3 |
129. |
A digital signature needs ____ system |
A. | symmetric-key |
B. | asymmetric-key |
C. | either (a) or (b) |
D. | neither (a) nor (b) |
Answer» B. asymmetric-key |
130. |
“Elliptic curve cryptography follows the associative property.” |
A. | true |
B. | false |
Answer» A. true |
131. |
ECC stands for |
A. | elliptic curve cryptography |
B. | enhanced curve cryptography |
C. | elliptic cone cryptography |
D. | eclipse curve cryptography |
Answer» A. elliptic curve cryptography |
132. |
When a hash function is used to provide message authentication, the hash function value is referred to as |
A. | message field |
B. | message digest |
C. | message score |
D. | message leap |
Answer» D. message leap |
133. |
Message authentication code is also known as |
A. | key code |
B. | hash code |
C. | keyed hash function |
D. | message key hash function |
Answer» C. keyed hash function |
134. |
The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key. |
A. | true |
B. | false |
Answer» B. false |
135. |
The DSS signature uses which hash algorithm? |
A. | md5 |
B. | sha-2 |
C. | sha-1 |
D. | does not use hash algorithm |
Answer» C. sha-1 |
136. |
What is the size of the RSA signature hash after the MD5 and SHA-1 processing? |
A. | 42 bytes |
B. | 32 bytes |
C. | 36 bytes |
D. | 48 bytes |
Answer» C. 36 bytes |
137. |
In the handshake protocol which is the message type first sent between client and server ? |
A. | server_hello |
B. | client_hello |
C. | hello_request |
D. | certificate_request |
Answer» B. client_hello |
138. |
One commonly used public-key cryptography method is the ______ algorithm. |
A. | rss |
B. | ras |
C. | rsa |
D. | raa |
Answer» C. rsa |
139. |
he ________ method provides a one-time session key for two parties. |
A. | diffie-hellman |
B. | rsa |
C. | des |
D. | aes |
Answer» A. diffie-hellman |
140. |
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other. |
A. | man-in-the-middle |
B. | ciphertext attack |
C. | plaintext attack |
D. | none of the above |
Answer» A. man-in-the-middle |
141. |
1. VPN is abbreviated as __________ |
A. | visual private network |
B. | virtual protocol network |
C. | virtual private network |
D. | virtual protocol networking |
Answer» C. virtual private network |
142. |
__________ provides an isolated tunnel across a public network for sending and receiving data privately as if the computing devices were directly connected to the private network. |
A. | visual private network |
B. | virtual protocol network |
C. | virtual protocol networking |
D. | virtual private network |
Answer» D. virtual private network |
143. |
Which of the statements are not true to classify VPN systems? |
A. | protocols used for tunnelling the traffic |
B. | whether vpns are providing site-to-site or remote access connection |
C. | securing the network from bots and malwares |
D. | levels of security provided for sending and receiving data privately |
Answer» C. securing the network from bots and malwares |
144. |
What types of protocols are used in VPNs? |
A. | application level protocols |
B. | tunnelling protocols |
C. | network protocols |
D. | mailing protocols |
Answer» A. application level protocols |
145. |
VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network. |
A. | true |
B. | false |
Answer» A. true |
146. |
There are _________ types of VPNs. |
A. | 3 |
B. | 2 |
C. | 5 |
D. | 4 |
Answer» B. 2 |
147. |
_________ type of VPNs are used for home private and secure connectivity. |
A. | remote access vpns |
B. | site-to-site vpns |
C. | peer-to-peer vpns |
D. | router-to-router vpns |
Answer» A. remote access vpns |
148. |
Which types of VPNs are used for corporate connectivity across companies residing in different geographical location? |
A. | remote access vpns |
B. | site-to-site vpns |
C. | peer-to-peer vpns |
D. | country-to-country vpns |
Answer» B. site-to-site vpns |
149. |
Site-to-Site VPN architecture is also known as _________ |
A. | remote connection based vpns |
B. | peer-to-peer vpns |
C. | extranet based vpn |
D. | country-to-country vpns |
Answer» C. extranet based vpn |
150. |
There are ________ types of VPN protocols. |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 6 |
Answer» D. 6 |
151. |
In tunnel mode, IPSec protects the ______ |
A. | entire ip packet |
B. | ip header |
C. | ip payload |
D. | ip trailer |
Answer» A. entire ip packet |
152. |
Pretty good privacy (PGP) is used in ______ |
A. | browser security |
B. | email security |
C. | ftp security |
D. | wifi security |
Answer» B. email security |
153. |
PGP encrypts data by using a block cipher called ______ |
A. | international data encryption algorithm |
B. | private data encryption algorithm |
C. | internet data encryption algorithm |
D. | local data encryption algorithm |
Answer» A. international data encryption algorithm |
154. |
IKE creates SAs for _____. |
A. | ssl |
B. | pgp |
C. | ipsec |
D. | vp |
Answer» C. ipsec |
155. |
SSL provides _________. |
A. | message integrity |
B. | confidentiality |
C. | compression |
D. | all of the above |
Answer» D. all of the above |
156. |
IKE uses _______ |
A. | oakley |
B. | skeme |
C. | isakmp |
D. | all of the above |
Answer» D. all of the above |
157. |
In ______, there is a single path from the fully trusted authority to any certificate. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» A. x509 |
158. |
_______ uses the idea of certificate trust levels. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» B. pgp |
159. |
________ provides privacy, integrity, and authentication in e-mail. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» C. pgp |
160. |
In _____, there can be multiple paths from fully or partially trusted authorities. |
A. | x509 |
B. | pgp |
C. | kdc |
D. | none of the above |
Answer» B. pgp |
161. |
______ provides authentication at the IP level. |
A. | ah |
B. | esp |
C. | pgp |
D. | ssl |
Answer» A. ah |
162. |
In _______, the cryptographic algorithms and secrets are sent with the message. |
A. | ipsec |
B. | ssl |
C. | tls |
D. | pgp |
Answer» D. pgp |
163. |
______ was invented by Phil Zimmerman. |
A. | ipsec |
B. | ssl |
C. | pgp |
D. | none of the above |
Answer» C. pgp |
164. |
ISAKMP stands for ______ |
A. | internet system association and key management packet |
B. | internet security association and key management protocol |
C. | interchange system and key modeling protocol |
D. | internet security association and key modeling protocol |
Answer» B. internet security association and key management protocol |
165. |
PGP makes use of which cryptographic algorithm? |
A. | des |
B. | aes |
C. | rsa |
D. | rabin |
Answer» C. rsa |
166. |
What is the key size allowed in PGP? |
A. | 1024-1056 |
B. | 1024-4056 |
C. | 1024-4096 |
D. | 1024-2048 |
Answer» C. 1024-4096 |
167. |
In SSL, what is used for authenticating a message? |
A. | mac (message access code) |
B. | mac (message authentication code) |
C. | mac (machine authentication code) |
D. | mac (machine access code) |
Answer» B. mac (message authentication code) |
168. |
S/MIME is abbreviated as __________________ |
A. | secure/multimedia internet mailing extensions |
B. | secure/multipurpose internet mailing extensions |
C. | secure/multimedia internet mail extensions |
D. | secure/multipurpose internet mail extensions |
Answer» D. secure/multipurpose internet mail extensions |
169. |
Security Measures Needed to protect ________ during their transmission |
A. | file |
B. | data |
C. | packet |
D. | all of above |
Answer» B. data |
170. |
__________ means knowledge obtained from investigation, study , intelligence new ,facts . |
A. | security |
B. | data |
C. | information |
D. | none of these |
Answer» C. information |
171. |
Prevention of the unauthorised used of Resources refers too? |
A. | data integrity |
B. | data confidentiality |
C. | acess control |
D. | none of these |
Answer» C. acess control |
172. |
Protection against Denial by one of these parties in a communication refers to? |
A. | non-repudiation |
B. | data integrity |
C. | authentication |
D. | none of these |
Answer» A. non-repudiation |
173. |
Which One of them is Passive attack? |
A. | denial of service |
B. | modify message in transit |
C. | replay previous message |
D. | obtain message contain |
Answer» D. obtain message contain |
174. |
What is lying of IP address called as? |
A. | ip spoofing |
B. | ip scamming |
C. | ip lying |
D. | none of theses |
Answer» A. ip spoofing |
175. |
What is full form of DDoS? |
A. | derived denial of service |
B. | distributed denial of service |
C. | denial of service |
D. | none of these |
Answer» B. distributed denial of service |
176. |
A hacker guessing suggested password to a program is call as? |
A. | password guessing |
B. | dictionary attack |
C. | default password attack |
D. | none of these |
Answer» C. default password attack |
177. |
Symmetric key encryption is also called as? |
A. | public key encryption |
B. | private key encryption |
C. | both of these |
D. | none of these |
Answer» B. private key encryption |
178. |
Conversion of Cypher text to plain text? |
A. | encryption |
B. | decryption |
C. | simple text |
D. | none of these |
Answer» B. decryption |
179. |
__is used to create the organisation's overall security program. |
A. | program policy |
B. | purpose |
C. | security |
D. | none of these |
Answer» A. program policy |
180. |
An act of protecting information from unauthorised disclouser to an entity.- |
A. | intergrity |
B. | avability |
C. | confidentiality |
D. | none of these |
Answer» C. confidentiality |
181. |
A way to ensure that the entity is indeed what it claims to be.- |
A. | authentication |
B. | accountability |
C. | identification |
D. | security |
Answer» A. authentication |
182. |
The__model is 7 layer architecture where each layer is having some specific functionality to perform. |
A. | tcp |
B. | osi |
C. | ois |
D. | none of these |
Answer» B. osi |
183. |
The full form of OSI is OSI model__. |
A. | open systems interconnection |
B. | open software interconnection |
C. | open connection |
D. | open system internet |
Answer» A. open systems interconnection |
184. |
The technique in which when one character is replaced by another Character is called as? |
A. | transposition |
B. | substitution |
C. | combinational |
D. | none of these |
Answer» B. substitution |
185. |
Conversion of plain text into Cipher text is called as________. |
A. | encryption |
B. | decryption |
C. | hidden text |
D. | none of above |
Answer» A. encryption |
186. |
In Symmetric schemes requires both parties to share how many secret key? |
A. | one |
B. | two |
C. | three |
D. | four |
Answer» A. one |
187. |
Blum Blum Shub Generator is based on which Algorithm? |
A. | private key |
B. | public key |
C. | both a & b |
D. | none of these |
Answer» B. public key |
188. |
In DES step both LPT and RPT undergoes in how much key Rounds? |
A. | 8 |
B. | 16 |
C. | 32 |
D. | 64 |
Answer» B. 16 |
189. |
What is the 4th step in DES Algorithm? |
A. | key transformation |
B. | s-box substitution |
C. | p-box permutation |
D. | expansion permutation |
Answer» C. p-box permutation |
190. |
In AES in which Round Subkeys are Generated from Original key for each round? |
A. | key expansion |
B. | initial round |
C. | finale round |
D. | none of these |
Answer» A. key expansion |
191. |
AES stands for? |
A. | authorized encryption standard |
B. | advance encryption standard |
C. | advance encryption strategy |
D. | none of these |
Answer» B. advance encryption standard |
192. |
Which of them is type of Cipher? |
A. | stream cipher |
B. | block cipher |
C. | both of them |
D. | none of these |
Answer» C. both of them |
193. |
The message which is not understandable is called as? |
A. | cipher text |
B. | plain text |
C. | hidden text |
D. | both a & c |
Answer» A. cipher text |
194. |
The__is a polygraphic substitution cipher based on linear algebra. |
A. | hill cipher |
B. | playfair cipher |
C. | affine cipher |
D. | none of these |
Answer» A. hill cipher |
195. |
__is the practice of concealing a message within another message,image or file. |
A. | steganography |
B. | cryptography |
C. | cipher |
D. | receiver |
Answer» A. steganography |
196. |
In asymmetric key cryptography, the private key is kept by __________ |
A. | sender |
B. | receiver |
C. | sender and receiver |
D. | none of these |
Answer» B. receiver |
197. |
In cryptography the original message before being transform is called |
A. | simple text |
B. | plain text |
C. | empty text |
D. | filled text |
Answer» B. plain text |
198. |
An asymmetric-key (or public-key) cipher uses |
A. | 1 key |
B. | 2 key |
C. | 3 key |
D. | 4 key |
Answer» A. 1 key |
199. |
In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is |
A. | short |
B. | flat |
C. | long |
D. | thin |
Answer» C. long |
200. |
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to |
A. | other |
B. | data |
C. | keys |
D. | each other |
Answer» D. each other |
Done Reading?